Critical to any counsel working to prevent a cyber-attack or respond to a successful cyber intrusion is an understanding why and how to properly utilize both attorney-client and work-product privilege. The overriding principle of using privilege is straightforward: to protect your organization's investigation and breach response efforts from usage by third parties or regulatory agencies in litigation arising from a breach.
- June 01, 2018Robert W. Anderson and Eric B. Levine
Part One of a Two-Part Article
Part One of this two-part article is aimed at demystifying the hesitations behind cloud security and analyzing the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice.
June 01, 2018Adam CohenEven though law firms don't generally manage retail-type websites, they are far from immune to cyber threats. In fact, firms are prime targets for cyber criminals.
June 01, 2018Melanie TrudeauPart Two of a Two-Part Article
Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.
June 01, 2018Jared CosegliaWith the corpus of law data becoming ever-more complex and nuanced, the use of machine-assisted research and analysis is becoming more of a requirement, rather than an option, in the legal profession. Because of this, some have expressed fear that robot-lawyers will replace legal professionals.
June 01, 2018Jeff Reihl and Rick McFarlandA Q&A with Penn Law Prof. Anne Toomey McKenna
The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.
June 01, 2018Gabrielle Orum HernándezOft-Considered an Avenue for Individuals to Attain Greater Control over Their Digital Information, Blockchain Could Be Leveraged By Facebook to Change Its Status As “Gatekeeper” for User Data
Facebook Inc. recently announced that it will begin exploring different ways to incorporate blockchain into its infrastructure. Yet, questions remain over how the social media company will implement the technology and what sort of legal challenges doing so could portend.
June 01, 2018Ian LopezA look at key court rulings on e-discovery matters from the winter of 2017-18.
June 01, 2018Mike HamiltonGov. Nathan Deal opted to veto a cybersecurity bill criticized by technology groups that would have made “unauthorized computer access” a crime.
May 09, 2018Gabrielle Orum HernándezU.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's "right to erasure" while still fulfilling their U.S. records retention obligations?
May 02, 2018Stacey Garrett











