Posts Tagged ‘data security’
How to Practice Safe Online Habits and Make Cybersecurity a Priority
All it takes is one click for your cyber security to spiral out of control. It’s evident through an uptick in SPAM, data breaches, and phishing attacks that there is no better time than now to keep Cybersecurity at the front of mind.
Read MoreRevisiting ABA’s Law Firm Guide to Cybersecurity – Why You Should Care
Published nearly a year ago, the American Bar Association’s “Law Firm Guide to Cybersecurity” is more relevant than ever. Cybersecurity and Information Governance are major pillars in the legal sector. Law firms, litigation support providers, and corporate legal departments handle extremely sensitive information making it both crucial that these organizations implement cybersecurity best practices and also stay informed in the current techniques hackers are deploying to get access to this information.
Read MoreSecuring Data Through End To End Encryption (E2EE)
True ESI defensibility starts with maintaining the authenticity and privacy of the data from the moment it is collected all the way to hosting and later deletion. Data encryption provides the backbone for this security through concealing the data in a cipher, thus making it unreadable to anyone without the key.
Read MoreCalifornia Privacy Rights Act (CPRA) Brings Focus to Data Minimization
Following California’s implementation of the California Consumer Privacy Act (CCPA) which took effect on January 1st, 2020. The state is setting up the California Privacy Rights Act (CPRA) which is slated for January 1st, 2023.
The CRPA is an expansion beyond the CCPA, and will supersede it once the CRPA is fully effective. The key differences between California Privacy Rights Act (CPRA) & the California Consumer Privacy Act (CCPA) is the addition of the data minimization clause.
Read MoreWhat Is FTP And Why Is It Secure?
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially transfer files via a computer network. There are various types of file transfer protocols but FTP is one of the more common methods used within the legal industry. FTP is typically secured through the attachment of SSL/TLS (FTPS).
Read MoreWhat Legal Professionals Need to Know About the Importance of SOC 2 Compliance
Understanding security compliance can be especially important for legal firms that represent banks, defense contractors and other financial institutions that are regulated by the PCI Security Standards Council and the Sarbanes-Oxley Act. Data security will continue to remain a major focus for corporate IT risk management.
Read MoreApproved Final Set of California Consumer Privacy Act (CCPA) Regulations Now in Effect
California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018 and first took effect at the start of the new year on January 1, 2020. The new regulations were approved on August 14, 2020 and went into effect immediately.
Read MoreOverview of The New York SHIELD Act – Data & Privacy Laws
The SHIELD Act, Stop Hacks and Improve Electronic Data Security Act, which was signed in by New York’s Governor on July 25, 2019. While the data breach aspect of the law went into effect last October, the data privacy portion only became effective as of March 21, 2020.
Read MoreVPN & Remote Desktop Security More Important Now Than Ever
People across the nation are staying home, working remotely and practicing social distancing but that doesn’t mean professional life as we know it halts to a stop. Many organizations have had to adapt and create systems for their business operations to move smoothly into the cloud and remote access. One of the biggest concerns with this transition is maintaining security and integrity of your companies data with the increased risk associated with remote access.
Read MoreControlling Third-Party Data
Third-party data is defined as any data collected from variety of sources by a company with no direct connection to the consumer whose data is collected.
Read More