Marketing to Millennials
Top Three Cybersecurity Misconceptions
Technology in Healthcare
The Intersection of Cyber and D&O Coverage
Compiling Successful IP Solutions for Software Developers
Regan Miller, RPLU on Cyber Risk
BakerHostetler's Tanya Forsheit Discusses Cloud Computing
Perla: LegalTech Startups Can't Fix BigLaw's Cyber-Security Problems
Competitor or Collaborator? What UpCounsel's Growth Means for BigLaw
Polsinelli Podcasts - Hedge Funds Now Using IPR Challenges
MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Mar. 18, 2015 (Mimesis Law) -- David Perla, president of Bloomberg Law, talks with Lee Pacchia about his vision for the future of the company, BigLaw's response to cyber-security threats and the prospects for the legal...more
Rule 1.1 of the Model Rules of Professional Conduct requires that all lawyers provide “competent representation to a client.” In August 2012, the ABA added new language to Model Rule 1.1, comment 8:
To maintain the...more
Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more
In-depth Q&A with attorney David A. Bateman about the Cyber Civil Rights Legal Project, which Bateman co-founded last year with K&L Gates colleague Elisa J. D'Amico to help victims of revenge porn.
We wanted to learn...more
It has been clear for some time that cybercrime isn’t an outlier in the spectrum of corporate risk. Yet many organizations have been slow to wake up to that reality, or having awoken, are unsure of what steps to take to...more
In today’s digital age, no person’s private information is considered off limits by hackers. Recently, several celebrities, including Jennifer Lawrence and Kate Upton, had their iCloud storage accounts hacked and their...more
For years now lawyers and law firms providing professional services to health care providers or health insurance plans should have had in place essential safeguards to meet the responsibilities and requirements as business...more
My bank recently sent me a document with “Techniques for creating strong passwords.” Reading through it my first thought was, “This would be great information for my colleagues.” Court reporters protect private, sensitive...more
Law firms do not hold special immunity from the threat of cybercriminals. In fact, law firms should be extra vigilant, considering the breadth of sensitive client information they often possess regarding corporate...more
In the last few months, numerous cases involving Facebook have resulted in amusing rulings that we would be remiss to ignore. On deck for this blog post we have three good ones...more
Why People are Careless about Internet Privacy -
If you are like me, you have probably wondered why people choose to share so much about themselves and their families on Facebook. Why do people treat the social media...more
Moving data to the cloud has been the critical data security challenge confronting organizations in the past few years.
With the cloud transition well underway, the spotlight has turned to securing end-user devices like...more
"Lawyers in the Cloud" explains the cloud storage system, risks, and how to assess whether to use large private systems or public systems like DropBox. From the July/August 2012 Palm Beach Bar Bulletin....more
Things happen at places like the ABATechshow that make you feel like you are experiencing the future unfold right in the moment. Nothing like watching planes crash into the World Trade Center or the devastation of Japan’s...more
UK data protection has come of age with large fines levied for the first time and a well-publicised leak from a law firm. Is your law firm compliant with data protection standards?...more
It is time to talk about cloud computing and ethics. Yes, ethics. Historically, lawyers and technologists lived in different worlds. The lawyers were over here, and IT was over there. Here's the reality: Technology -...more
This manuscript was submitted as material for a Presidential CLE program at the 2010 ABA Annual Meeting. The panel discussion, hosted by the ABA Commission on Ethics 20/20, covered cloud computing and virtual law practice,...more
Web-based technologies are part of an exciting new frontier aimed at delivering efficient, accessible, and affordable products and services to their clients. The rapid advance of web- or cloud-based technologies has opened up...more
Beginning February 17, 2010,lawyers who represent clients in the healthcare industry face new statutory obligations to take affirmative steps to ensure the privacy of their clients’ patient information when it is transmitted...more
The shift from desktop- and server-based software to what is alternately referred to as “Software-as-a-Service” (SaaS) or “the cloud” is one of the most significant transitions to occur in computing in the last 20 years....more
Computer forensic techniques may be unfairly applied in order to tip the scales of justice in the direction of prosecution. Particular areas that are known to be problematic for defense experts include: erroneous allegations...more
In this document we aim to demystify the concept of Software-as-a-Service and educate attorneys on how to evaluate the suitability of available solutions for their practice.
Topics addressed include an overall description...more
Are you on Facebook? Have you tweaked your Facebook privacy settings to ensure that you keep your personal and professional lives separate? Read this article and learn the essential steps you can take in under 10 minutes to...more
"Electronic Surveillance amd Offshore Legal Communications" is a June 12, 2008 editorial essay about a declaratory judgment action filed the prior month, NMH v. Bush et al. (D.D.C. 2008). NMH v. Bush appears to many readers...more
Find a Science, Computers & Technology Author »
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top