Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Using Computer Forensics to Investigate Employee Data Theft Image

Using Computer Forensics to Investigate Employee Data Theft

Timothy M. Opsitnick, Joseph M. Anguilano & Trevor B. Tucker

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

Features

State of the Industry: e-Discovery and Cybersecurity Image

State of the Industry: e-Discovery and Cybersecurity

Jared Coseglia

<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.

Features

Information Governance: Law Firms' Cybersecurity Weak Spot Image

Information Governance: Law Firms' Cybersecurity Weak Spot

Ian Raine

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

Features

Survey Reflects Growth in How Corporations Manage and Protect Information Image

Survey Reflects Growth in How Corporations Manage and Protect Information

Ari Kaplan

Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.

Features

Got a Negative Online Review? First Things First: Turn Off Your Attorney Image

Got a Negative Online Review? First Things First: Turn Off Your Attorney

Dan Lear

It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.

Features

Back in the GDPR Image

Back in the GDPR

Dan Panitz & H. Bruce Gordon

Any company operating globally should protect its value through exposure containment under both privacy shield and the forthcoming GDPR.

Features

User Behavior Analytics and Your Company's Data Image

User Behavior Analytics and Your Company's Data

Jason Straight

While cybersecurity spending at many organizations still tends to focus on perimeter defenses, security experts have begun to face the reality that it is nearly impossible to keep bad actors out of your network, and are turning their attention to better ways of mitigating threats posed by intruders once they've hacked their way in.

Features

<b><i>Legal Tech</b></i><br>Making Sense of New Data Types in the App Age Image

<b><i>Legal Tech</b></i><br>Making Sense of New Data Types in the App Age

Tim Anderson & JR Jenkins

While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Features

The GDPR Image

The GDPR

Ryan Costello

<b><i>Considerations for Corporate Counsel and Discovery Teams</b></i><p>With the EU's General Data Protection Regulation (GDPR) set to take effect in May 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.

Features

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security Image

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security

C. Ryan Barber

Association of Corporate Counsel Releases First Set of Model Cybersecurity Practices

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Meet the Lawyer Working on Inclusion Rider Language
    At the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers &amp; Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.
    Read More ›
  • Law Firms and the Rise of Hospitality
    The law firm office cannot remain unchanged, as if frozen in time set to some date prior to the onset of pandemic, when the terms and meaning have all changed. In fact, the office must now provide benefits or an experience the lawyers and staff cannot get at home.
    Read More ›
  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›