Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
With the Panama Paper incident and other noteworthy recent law firm security breaches top of mind (see, “Hackers Breach Law Firms,” Wall Street Journal (March 29, 2016)), law firms in the U.S. and around the world are increasingly concerned about being hacked by cybercriminals (see, “Cyberattack Exposes Law Firms’ Weak Spots,” Wall Street Journal (Dec. 29, 2016). In response, many firms have significantly upgraded their perimeter security systems to ensure that only authorized and authenticated users can access their systems. Yet perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm’s emails, documents and other work product.
*May exclude premium content
By Jared Coseglia
A deep dive into the pre and post pandemic e-discovery job market landscape and what data privacy professionals can learn from ESI employment trends.
Part Two of a Two-Part Article
By Tariq Hafeez
For the automotive industry already facing cost constraints as a result of the pandemic, the predicted increase in litigation activity accentuates the need to invest in innovative service and delivery models to cut litigation costs.
By Rebecca Perry
America and the EU Continue Altering Data Privacy Frameworks for Businesses
A close look at a couple of privacy-related issuances from California, along with the European Court of Justice ruling invalidating the EU-U.S. privacy shield.
By Christopher Zegers
Our forced experiment in change and technology adoption caused increasing technology investments. We’re never going back the way we were — and this will be to the benefit of firms, profitability, clients and lawyers if we make the right technology investments. Here are some specific ways firms can capture these benefits.