Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Polsinelli Podcast - Telephone Consumer Protection Act and Consequences for Corporations
Cullen & Dykman Sees Colleges Calling for Title IX Help v
Legal Minute: Cybersecurity Reporting Requirements for Government Contractors
Waldman: Stop Immunizing Websites That Allow Harassment
Investment Management Update - Focus on Data Privacy and Cybersecurity
Data Privacy: The Next Frontier of Corporate Compliance
A Moment of Simple Justice - Cameras on Cops
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Why Cyber Security?
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Are Criminal Laws the Right Response to Revenge Porn?
Bitter C-Suite: Privacy, Security and Data Protection Issues Facing Corporations, Directors and Officers
An Overview of the 2014 Class Action Survey
Jail Time for Revenge Porn Offenses?
What you need to know about Canada's new Anti-Spam Law (CASL)
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
EU Data Protection Reform – Interview with Susan Foster, Member, Mintz Levin
Mobile App Series: Privacy by Design
Mar. 18, 2015 (Mimesis Law) -- David Perla, president of Bloomberg Law, talks with Lee Pacchia about his vision for the future of the company, BigLaw's response to cyber-security threats and the prospects for the legal...more
Rule 1.1 of the Model Rules of Professional Conduct requires that all lawyers provide “competent representation to a client.” In August 2012, the ABA added new language to Model Rule 1.1, comment 8:
To maintain the...more
Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more
In-depth Q&A with attorney David A. Bateman about the Cyber Civil Rights Legal Project, which Bateman co-founded last year with K&L Gates colleague Elisa J. D'Amico to help victims of revenge porn.
We wanted to learn...more
Last week I passed an examination on European privacy that entitles me to add CIPP/E after my name.
It has been clear for some time that cybercrime isn’t an outlier in the spectrum of corporate risk. Yet many organizations have been slow to wake up to that reality, or having awoken, are unsure of what steps to take to...more
In today’s digital age, no person’s private information is considered off limits by hackers. Recently, several celebrities, including Jennifer Lawrence and Kate Upton, had their iCloud storage accounts hacked and their...more
For years now lawyers and law firms providing professional services to health care providers or health insurance plans should have had in place essential safeguards to meet the responsibilities and requirements as business...more
My bank recently sent me a document with “Techniques for creating strong passwords.” Reading through it my first thought was, “This would be great information for my colleagues.” Court reporters protect private, sensitive...more
Court reporters, like everyone else on the planet, want to keep their identity secure. Here are eight tips. My next blog will be tips on creating strong passwords.
- Keep your personal information safe and...more
Law firms do not hold special immunity from the threat of cybercriminals. In fact, law firms should be extra vigilant, considering the breadth of sensitive client information they often possess regarding corporate...more
In Amneal Pharmaceuticals LLC v, Supernus Pharmaceuticals, Inc., IPR2013-00372, Paper 33 (March 7, 2014), the Board rejected Supernus proposed protective order which sought to create a category of highly confidential...more
In the last few months, numerous cases involving Facebook have resulted in amusing rulings that we would be remiss to ignore. On deck for this blog post we have three good ones...more
March 14 (Bloomberg Law) -- Bloomberg Law's Lee Pacchia runs through the legal news for the week. New Jersey-based Archer & Greiner PC is the latest law firm to announce layoffs of attorneys and staff. Also, counsel for...more
A new ruling that could affect how Phoenix law offices advise their
clients on contract law is currently in the news. In September, an
Arizona appellate court advised that a trial court needed to determine
Why People are Careless about Internet Privacy -
If you are like me, you have probably wondered why people choose to share so much about themselves and their families on Facebook. Why do people treat the social media...more
Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.
With the cloud transition well underway, the spotlight has turned to securing end-user devices like...more
Highlighted in Forbes’ Law & Technology Blog as one of Eight Great Law & Technology Resources, Orange Legal Technologies’ Unfiltered Orange Weekly eDiscovery News Updates provide readers with a trusted compilation of key...more
"Lawyers in the Cloud" explains the cloud storage system, risks, and how to assess whether to use large private systems or public systems like DropBox. From the July/August 2012 Palm Beach Bar Bulletin....more
Presented by Michael Kaiser of the Kaiser Legal Group at the Seattle Continuing Legal Education seminar (CLE) "Everything You Don't Know About E-Discovery (But Wish You Did)." The CLE was held at the Washington State...more
Clients Value Their Privacy
I do not provide references because my clients value their privacy and time, as do I. After practicing law for 25 years, I am thoroughly imbued with the concept of confidentiality, and I take...more
The new electronic signature process for the authorization to disclose information to the Social Security Administration (Form SSA-827) is scheduled to begin April 21, 2012. The process was developed to comply with the laws...more
Web 2.0, mobile applications and cloud based services have revolutionized how companies communicate and interact with customers, current and prospective, and how businesses process, transmit, secure and store information. ...more
Find a Privacy Author »
Back to Top