X

data privacy

How to Practice Safe Online Habits and Make Cybersecurity a Priority

All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick…

Revisiting ABA’s Law Firm Guide to Cybersecurity – Why You Should Care

Published nearly a year ago, the American Bar Association's "Law Firm Guide to Cybersecurity" is more relevant than ever. Cybersecurity…

ABA Cybersecurity Legal Task Force Releases Second Edition of Vendor Contracting Project: Cybersecurity Checklist

If your organization has been looking for a clear and concise resource for cybersecurity guidance, the American Bar Association's Cybersecurity…

What Is FTP And Why Is It Secure?

File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially…

Approved Final Set of California Consumer Privacy Act (CCPA) Regulations Now in Effect

California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018…

Teleconferencing Concerns Raise as VTC Hijacking Reports Increase

Video-teleconferencing (VTC) have become a pivotal aspect of connectivity in wake of the COVID-19 crisis. As a result, reports of…

Controlling Third-Party Data

Third-party data is defined as any data collected from variety of sources by a company with no direct connection to…

Assess Risk After a Breach – Including Security Breach Notification Laws By State

A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted…

Risk or Reward? Service Organization Control “SOC” Reports

As legal technology and advancements within areas such as cloud technology and software-as-a-service, clients are facing increased pressure to make…

Recent Case Law: Takeaways From The 11th Circuit Decision In FTC v. LabMD

What does this ruling mean with respect to your company (or your client)? Extract from an article by Tom Kulik…