The recent move to more remote work environments has prompted many to take a second look at not only eSignature solutions but also remote online notarization (RON). In order to support transactional practice groups in making the transition to electronic signing and closings, one must understand the challenges and opportunities of these technologies.
Jonathan B. New, Jimmy Fokas, Patrick T. Campbell and Bari R. Nadworny
In recent months, the U.S. Department of Justice has raised expectations for companies to use data analytics to monitor the effectiveness of their compliance programs and to identify potential misconduct.
Chase D’Agostino and Andy Banquer
What is the right strategic approach for a legal department to optimize its return on investment for the resources it deploys to render legal services?
America and the EU continue altering data privacy frameworks for businesses.
Shari Claire Lewis
Companies considering whether to suggest, or even to require, contact tracing for employees or others must consider a host of legal issues, including privacy. This article describes contact tracing, focusing on how technology has made it a more powerful weapon against viruses and diseases than ever before.
Shaia Araghi and Kyle Janecek
Users have become increasingly concerned about the privacy of videoconferencing platforms, due to exposure of information from security breaches. We examined the privacy policies of six prominent applications to determine their compliance with the California Consumer Privacy Act (CCPA).
Brenda Sapino Jeffreys
Law firms in every segment of the market are hiring cybersecurity and privacy laterals and launching new practices, as more of their clients become aware of their vulnerabilities while working remotely.
In this quarter’s Case Law Review, we’ll take a look at recent rulings that cover the discoverability of ESI on sources other than a computer, whether social media posts offer any degree of privacy, and the importance of proportionality when attempting to compel production during litigation.
Criminals have long taken advantage of unrest and instability, knowing that people’s attention will be diverted and their defenses down during uncertain times. This leaves ample space for the less altruistic among us to move in and manipulate a situation to their benefit.
Ransomware has come a long way since the 1989 “AIDS Trojan.” In 2019 ransomware demands topped $12M. Succinctly put: “Ransom demands grew larger. Tactics became more cutthroat.”