security

Ed note: This post originally appeared on Peter S. Vogel’s Internet, Information Technology & e-Discovery Blog.

A recent survey about BYOD (“Bring Your Own Device”) resulted in the finding that “78% of employees use their own mobile devices for work” and “the use of personal technology to access corporate data can be solved by better communication between both parties regarding security, data and privacy concerns.” On July 10, 2014 Webroot issued its BYOD Security Report entitled “Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)” which included these key findings:

double red triangle arrows Continue reading ““BYOD Bill of Rights” May Help Concerns about Privacy”

This summer, Above the Law expanded its editorial coverage with the launch of a suite of practice-focused channels. These new, topical components of our site include an eDiscovery channel, powered by content from Lexblog, JD Supra, and new ATL expert columnist Michael Simon, as well as pieces curated from ATL’s coverage of the broader legal industry. ATL’s eDiscovery channel will feature news stories, substantive trend analysis, and insights into business development issues relevant to eDiscovery and related legal technologies. (Among ATL’s other practice channels are Securities, Energy, and Government.)

The LexBlog network is the largest professional blog network in the world. LexBlog partners with clients to develop custom social media solutions and strategies that create powerful internet identities. LexBlog will provide ATL’s unparalleled audience with commentary on prominent legal developments and insight on best practices in the full range of practice areas, including eDiscovery.

ATL’s eDiscovery columnist, Michael Simon, has been in the legal industry for more than two decades. His background as a Chicago trial attorney, Director of Strategic Development at Navigant, and co-founder of eDiscovery expert consulting firm Seventh Samurai, give him a unique voice in the eDiscovery space. His debut column, Making Sense of eDiscovery Outside of the Bubble, offers a thoughtful introduction to legal technology and is but the first in a series.

JD Supra publishes insights and intelligence written by a network of over 20,000 attorneys and industry professionals. ATL’s partnership with JD Supra will give the ATL audience access to high-level eDiscovery content from Am Law 200 law firms and other expert sources.

ATL’s new eDiscovery channel is made possible by Omnivere, one of the largest integrated companies in the discovery management space. Omnivere provides services that encompass all aspects of litigation support, from Project Management, Review Support, and Hosting Management, to Attorney Review, Production, and Trial Exhibit and Document Management.

Ed note: This post originally appeared on InfoLawGroup.

Last week, the FTC released a study it conducted in connection with price-comparison apps, deal apps and apps that allow people to pay for purchases using their mobile device while shopping in brick-and-mortar stores. The newly released study is the latest commentary from the FTC in a long line of workshops and reports that started in 2012 on the issue of mobile apps, mobile payment mechanisms and related matters, such as mobile cramming and mobile security. Here are the key takeaways from the latest study:

double red triangle arrows Continue reading “Mobile Apps: FTC Says Vague Privacy Policies and Lack of Terms a Problem”

I write about hacking and data security periodically, even though sometimes I get the feeling legal professionals try hard not to think about the subjects. But the stories in this realm bear repeating. Corporate data security is a real concern for many, many corporate attorneys, and especially in-house counsel.

Data security problems used to stem most frequently from weak firewalls or unencrypted equipment. But more and more, the biggest sources of risk and liability are just dumb or technologically overeager employees.

What kind of computer trouble are you and everyone you know getting your company or firm into? Let’s see….

double red triangle arrows Continue reading “You Are Your Company’s Biggest Security Risk”