News & Analysis as of

Client Data Data Protection

ClientsFirst Consulting

Safeguarding Your Law Firm’s CRM System with Data Stewards

In today’s data-driven legal landscape, Client Relationship Management (CRM) systems have become indispensable tools for law firms. However, the effectiveness of this tool hinges on the quality and security of the data it...more

Perkins Coie

Cybersecurity for Lawyers: A Series

Perkins Coie on

If you are an attorney covering cybersecurity, not only do you have to stay on top of ever-evolving legal obligations and risks, you have to be able to speak competently with your technical counterparts....more

EDRM - Electronic Discovery Reference Model

[Webinar] Rise of the Machines IV: Maximizing the Benefits of Technology in Law Practice Workflow - June 20th, 1:00 pm - 2:00 pm...

Unlock the Future of Law Practice: Join Our “Rise of the Machines” Webinar Series - Are you ready to transform your law practice with cutting-edge technology? Our "Rise of the Machines" webinar series offers practical...more

Clark Hill PLC

[Webinar] Cybersecurity Resilience in Law Firms - March 6th, 9:00 am PT

Clark Hill PLC on

The legal profession faces unprecedented challenges in securing sensitive client data and maintaining the integrity of digital practice. This webinar focuses on law firms seeking useful information about robust cybersecurity...more

TransPerfect Legal

[Webinar] Ethics, Cybersecurity, Privacy, and Data Protection - March 8th, 9:00 am - 10:15 am PST

TransPerfect Legal on

Join our CLE webinar, "Ethics, Cybersecurity & Data Protection: Mastering Competent Representation," as we explore reasonable steps needed for lawyers to comply with the duty of providing competent representation. Dive into...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law. - September 28th, 2:00 pm - 3:00 pm BST

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law - September 13th, 1:00 pm - 2:00 pm ET

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

ClientsFirst Consulting

How to Solve Six Common Data Quality Management Issues

Data quality is crucial for any organization that relies on accurate information to make informed decisions. However, many businesses face various challenges when it comes to managing data quality effectively....more

HaystackID

[Webinar] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories - August 30th,...

HaystackID on

In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more

EDRM - Electronic Discovery Reference Model

[Webinar] Cyber Sidebar: The NIST Cybersecurity Framework Applied to the Legal Profession - November 15th, 1:00 pm - 2:15 pm ET

The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more

U.S. Legal Support

[Webinar] Culture of Confidentiality: How to ensure your external vendors are mitigating cybersecurity risk - July 20th, 10:00 am...

U.S. Legal Support on

Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more

Oberheiden P.C.

Cybersecurity Compliance Programs for Law Firms

Oberheiden P.C. on

Law firms process sensitive information on a daily basis. Confidential client data is targeted by hackers and insiders for a variety of reasons including financial gain or retaliatory purposes. When a law firm has a security...more

Association of Certified E-Discovery...

E-Discovery Gold Nuggets

Offering tips to help legal professionals with e-discovery, Daniel Gold’s “E-Discovery Gold Nuggets” highlight the newest legal technology lessons and challenges. Originally a series of short video clips on LinkedIn, ACEDS is...more

Troutman Pepper

International Litigation and Transactions in the Face of GDPR – A Panel Preview

Troutman Pepper on

On December 11, 2019, Pepper Hamilton will host our 10th Annual Antitrust Developments Update in Philadelphia. This interactive seminar will cover some of the leading topics in antitrust today and will provide attendees with...more

Association of Certified E-Discovery...

Putting Data Security First: 3 Simple Steps

The bad news first. An estimated 3.5 million cybersecurity positions will be unfilled globally by 2021.* Leaving data security entirely up to the professionals isn’t a viable option. Like it or not we’re all on the...more

Epiq

ABA Issues Opinion - How To Respond to Data Breaches

Epiq on

In 2018, 1,244 data breaches occurred in the U.S. with over 445.6 million records exposed with a cost of $654 billion. Lawyers make a promise to safeguard confidential client data when they enter into an attorney-client...more

Patterson Belknap Webb & Tyler LLP

ABA Provides Guidance for Law Firm Data Breaches

Lawyers don’t get a free pass when it comes to data security. In fact, ethical rules impose a series of obligations on lawyers when they or their firms are subject to a data breach....more

Fisher Phillips

Attorneys Must Consider Ethical Obligations Associated with a Data Breach

Fisher Phillips on

Most attorneys are well aware of statutory obligations that require private and governmental entities to notify individuals of data breaches that involve the loss or disclosure of personally identifiable information. An area...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hacking Your Vote From Inside Your Head: How Cambridge Analytica Altered Reality Via Social Media To Induce Specific Voting...

We learned some important lessons this week about the dangers inherent to losing control of your customer or client data, either through hacking, internal theft, or poorly designed controls over what your business associates...more

Sheppard Mullin Richter & Hampton LLP

New York Settles EmblemHealth Breach for $575,000

The recent $575,000 settlement with EmblemHealth signals a push from AG Schneiderman “for stronger security laws and hold[ing] businesses accountable for protecting their customers’ personal data.” Noting New York’s “weak and...more

Adams and Reese LLP

ISO’s Cloud Privacy Standard: A Guide for Lawyers’ “Reasonable Efforts” to Protect Client Information

Adams and Reese LLP on

Rule 1.1 of the Model Rules of Professional Conduct requires that all lawyers provide “competent representation to a client.” In August 2012, the ABA added new language to Model Rule 1.1, comment 8: To maintain the...more

Robins Kaplan LLP

Mitigating Risk in Cloud Computing Agreements

Robins Kaplan LLP on

Cloud computing is the new reality. A 2013 IDC survey reports that 61% of enterprises have at least one cloud-based application and total enterprise investments in cloud-based solutions have gone up more than 10% since 2012....more

22 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide