Posts Tagged ‘data privacy’
How to Practice Safe Online Habits and Make Cybersecurity a Priority
All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick in SPAM, data breaches, and phishing attacks that there is no better time than now to keep Cybersecurity at the front of mind.
Read MoreRevisiting ABA’s Law Firm Guide to Cybersecurity – Why You Should Care
Published nearly a year ago, the American Bar Association’s “Law Firm Guide to Cybersecurity” is more relevant than ever. Cybersecurity and Information Governance are major pillars in the legal sector. Law firms, litigation support providers, and corporate legal departments handle extremely sensitive information making it both crucial that these organizations implement cybersecurity best practices and also stay informed in the current techniques hackers are deploying to get access to this information.
Read MoreABA Cybersecurity Legal Task Force Releases Second Edition of Vendor Contracting Project: Cybersecurity Checklist
If your organization has been looking for a clear and concise resource for cybersecurity guidance, the American Bar Association’s Cybersecurity Legal Task Force has you covered. They recently released the second edition of the Vendor Contracting Project: Cybersecurity Checklist, which is tailored to solo and small firm attorneys who interact with vendors that handle sensitive and confidential information.
Read MoreWhat Is FTP And Why Is It Secure?
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially transfer files via a computer network. There are various types of file transfer protocols but FTP is one of the more common methods used within the legal industry. FTP is typically secured through the attachment of SSL/TLS (FTPS).
Read MoreApproved Final Set of California Consumer Privacy Act (CCPA) Regulations Now in Effect
California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018 and first took effect at the start of the new year on January 1, 2020. The new regulations were approved on August 14, 2020 and went into effect immediately.
Read MoreTeleconferencing Concerns Raise as VTC Hijacking Reports Increase
Video-teleconferencing (VTC) have become a pivotal aspect of connectivity in wake of the COVID-19 crisis. As a result, reports of VTC hijackings have popped up nationwide. Also known as Zoom-bombing, referring to the popular VTC tool Zoom, the FBI warns the public about the increased risk of online meetings being hijacked.
Read MoreControlling Third-Party Data
Third-party data is defined as any data collected from variety of sources by a company with no direct connection to the consumer whose data is collected.
Read MoreAssess Risk After a Breach – Including Security Breach Notification Laws By State
A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted environment. Data breaches can come in a plethora of forms, most commonly: ransomware, malware, phishing, denial of service & physical theft.
Read MoreRisk or Reward? Service Organization Control “SOC” Reports
As legal technology and advancements within areas such as cloud technology and software-as-a-service, clients are facing increased pressure to make sure their data is safe. Many companies resort to third party vendors to outsource services such as preserving and collecting ESI.
Read MoreRecent Case Law: Takeaways From The 11th Circuit Decision In FTC v. LabMD
What does this ruling mean with respect to your company (or your client)? Extract from an article by Tom Kulik There is an adage that has become all too common when dealing with a potential data breach: it’s not a matter of if, but when. Sad, but ultimately true. When it comes to cybersecurity for your (or…
Read More