News & Analysis as of

Confidential Information Encryption

Morrison & Foerster LLP

UK Data Recording Obligations – Have You Got the Message?

In recent weeks, the use of encrypted messaging applications for business purposes has returned to the spotlight. In July 2023, legal challenges surrounding the disclosure of messages on devices used by former Prime Minister...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

Planet Depos, LLC

Keeping the Record Sealed: Secure your Case Information and Documents

Planet Depos, LLC on

Security and confidentiality are paramount in legal matters. Even if a case matter has no protective order or confidential designation, you don’t want your clients’ information compromised in any way. It is a non-negotiable...more

Fisher Phillips

NFTs Aren’t Just Revolutionizing Art, Sports, and Videogames – They’re Changing the Future of Employment

Fisher Phillips on

NFTs – or non-fungible tokens – are increasingly popular among artists, sports figures, and the video game industry. But NFTs (some selling for upwards of eight figures) are not just for gamers, Mark Cuban, and the ultra...more

Rivkin Radler LLP

ABA Provides New Guidance On Remote Work For Lawyers

Rivkin Radler LLP on

On March 10, 2021, the American Bar Association released new guidance for attorneys working remotely. While there has never been a distinction in the Model Rules for Professional Conduct between working in a brick-and-mortar...more

Bradley Arant Boult Cummings LLP

Summary Judgment: Recent HIPAA Case Emphasizes Encryption, Action on Risk Analysis - AHLA Health Information and Technology...

On June 18, 2018, the U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) announced that an HHS Administrative Law Judge (“ALJ”) granted summary judgment to OCR in an enforcement action...more

Zuckerman Spaeder LLP

Gone Phishing: Employer Faces Liability for Mistakenly Disclosing W-2 Forms to Scammer

Zuckerman Spaeder LLP on

Phishing. Spoofing. - These words may sound silly, but for employers, they are anything but. Phishing is the attempt to obtain sensitive electronic information—such as usernames, passwords, or financial...more

Seyfarth Shaw LLP

ABA Encourages Encryption of Emails When Transmitting Confidential Client Information

Seyfarth Shaw LLP on

In a recent formal Ethics Opinion, the American Bar Association stressed that lawyers must make reasonable efforts to prevent inadvertent or unauthorized access to confidential information relating to the representation of...more

Baker Donelson

Eight Keys to Securing Portable Devices

Baker Donelson on

Securing physical worksites and workspaces is by now old hat. We all know file cabinets should be locked, worksites secured and personal access to information monitored. Securing portable devices, however, often receives less...more

Hogan Lovells

Health Company Fined by UK’s Information Commissioner Office

Hogan Lovells on

Last week, the UK’s Information Commissioner’s Office (ICO) published a monetary penalty notice which fined a private healthcare company, HCA International, £200,000 for its failure to keep sensitive data secure....more

Carlton Fields

NY DFS Proposed Cybersecurity Regulations Revised and Implementation Delayed

Carlton Fields on

We previously reported on the New York Department of Financial Services’ proposed cybersecurity regulations. During the public comment period, the DFS received over 150 comments. In response, the DFS announced on December 28,...more

Kilpatrick Townsend & Stockton LLP

Top 10 Ways to Protect Your Company’s Data

You know how important data is to your business and you have been hearing about data breaches for more than a decade, but where do you find a simple, straightforward summary of how to protect your company? That is a question...more

Foley & Lardner LLP

Recent Enforcement Shows the Importance of Encrypting Mobile Devices Containing Protected Health Information

Foley & Lardner LLP on

With headlines every day announcing another release of Protected Health Information (PHI), providers are asking themselves – is there a way to protect against these breaches? Beyond improving the security of large...more

Robins Kaplan LLP

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Robins Kaplan LLP on

As businesses increasingly store and access confidential information in the cloud, questions arise as to how to safeguard a company’s private data once it becomes part of an external computing network. Standards for...more

Foley & Lardner LLP

How Can You Safely Discuss Your IP with Others?

Foley & Lardner LLP on

As discussed in our previous posts, startups are about capitalizing on ideas, contacts and experience. In the early stages of a startup or pre-startup, founders often socialize their business plan and details about their idea...more

Mintz - Privacy & Cybersecurity Viewpoints

Data Breach at Gunpoint

You might think that if you lock your backup tapes in a safe they are protected from a data breach, but Kmart’s recent data breach proves that’s not the case. Last month, a person held a Kmart employee in Little Rock,...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide