By David P. Saunders, McDermott Will & Emery | October 8, 2021
A lesson learned by young lawyers everywhere is that internal, corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.
By David Kalat, BRG | October 4, 2021
Early computers were not only mammoth machines, they weren't very user-friendly. This month's history of cybersecurity examines how the relationship between Man and Machine was reimagined, starting with Xerox's Alto.
By Gina Taranto, ProSearch | September 23, 2021
What is an investigator, attorney, or other discovery professional to do when private information requires protection today, during a current litigation or investigation happening now, in the absence of clear guidance?
By Tim Dinsmore, Appurity | September 21, 2021
With the cybercriminal community rubbing their hands together in anticipation of further soft targets, it's crucial to make sure your organization takes the necessary steps to secure all devices.
By Cynthia Cole, Brooke Chatterton and Natalie Sanders, Baker Botts | September 13, 2021
Any tech companies or marketing firms who rely on harvested data need to consider the implications of these updates on their own products and business plans. And these privacy features are likely the first step in a long path of consumers taking more control of their data.
By Victoria Hudgins | September 9, 2021
In less than two months, China's Personal Information Protection Law (PIPL) is set to go into effect. Lawyers point to critical steps companies should take to protect their data processing and collecting practices.
By David Kalat, BRG | September 1, 2021
The man who knew more about Pacific Telephone's operations than the company itself: This month's history of cybersecurity and privacy explores the story of Jerry Schneider and his early fraud techniques.
By Mark Sangster, eSentire | August 23, 2021
In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. Here's how you can operate a secure virtual law practice.
By Emil Sayegh, Ntirety | August 13, 2021
Each component of a cyber defense system (the tactics) must serve the higher-level strategy and the strategy must drive what protections are put into action in the first place. This is where the concept of multi-level, comprehensive security takes form.
By David Kalat, BRG | August 4, 2021
Trying to pass legislation governing the prosecution of computer crimes was a rocky road before the Computer Fraud and Abuse Act, as this month's history of cybersecurity and privacy explains.
Presented by BigVoodoo
The premier educational and networking event for employee benefits brokers and agents.
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
Consulting Magazine recognizes leaders in technology across three categories Leadership, Client Service and Innovation.
Atlanta s John Marshall Law School is seeking to hire one or more full-time, visiting Legal WritingInstructors to teach Legal Research, Anal...
Shipman is seeking an associate to join our Labor & Employment practice in our Hartford, New Haven, or Stamford office. Candidates shou...
Evergreen Trading is a media investment firm headquartered in NYC. We help brands achieve their goals by leveraging their unwanted assets to...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS