News & Analysis as of

Cybersecurity Client Services Data Protection

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
U.S. Legal Support

10 Essential Cybersecurity Questions to Ask When Choosing a Litigation Support Services Partner

U.S. Legal Support on

In today’s digital age, robust cybersecurity measures are not just optional, but essential for law firms. Discover the critical questions to ask when selecting a litigation support services partner to help ensure your...more

U.S. Legal Support

Cybersecurity: a top legal industry concern and how to mitigate risk 

U.S. Legal Support on

Cybersecurity is a growing front of concern for legal entities, but just how concerned are lawyers about cybersecurity? Are they as concerned as they should be?...more

Troutman Pepper Locke

Digital Planning Podcast - Interview With Leeza Garber

Troutman Pepper Locke on

The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning, and estate administration. Your hosts, attorneys Jennifer Zegel, Ross Bruch, and...more

Foodman CPAs & Advisors

Will the IRS Integrated Modernization Business Plan Work?

On April 18, 2019, IRS released the IRS Integrated Modernization Business Plan April 2019  (Plan) -  a six year Plan designed to modernize the IRS’ technology systems, improve Taxpayer services and protect Taxpayer data. ...more

Bradley Arant Boult Cummings LLP

Cybersecurity Steps Every Lawyer Should Consider

All lawyers face technology threats, ranging from the inconvenient to practice-threatening disasters. From unauthorized access, lawyers risk having confidential information stolen, destroyed or made inaccessible. Hackers...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide