TAG: Security: LegalEthics.com resources relating to Security.  Subscribe

3 New Technology Positions Finding a Foothold in Modern Legal

Source |2017-06-27T00:20:51-07:00Jun 12th, 2017|Categories: Post|Tags: , , , , , , , , |

Technology’s impact on the legal industry is spurring a growing market for new in-house Talent — and its not just in e-discovery or cybersecurity. At Legalweek West’s “New Roles in IT for Law Firms and Legal Departments,” speakers shed light on several new and less-noticed jobs currently blooming at law firms and legal departments -- innovation officers, data scientists, and Knowledge Management/ Client Solutions Project Analyst (the last one is so 2000 but always important).

ABA Updates Guidance on Client Electronic Communication Confidentiality

Source |2017-07-20T09:59:27-07:00May 17th, 2017|Categories: Post|Tags: , |

New ABA opinion on electronic communications: A fact-based analysis means that particularly strong protective measures, like encryption, are warranted in some circumstances. See http://bit.ly/2rjtQFk Among other things, lawyers should understand the nature of the threat and how client confidential information is transmitted & stored; use reasonable electronic security measures; determine how to protect electronic communications; label confidential information, train legal professionals, and conduct vendor due diligence. http://bit.ly/2rjlOfJ

ACC Issues Guidelines for Law Firm Cybersecurity Measures

Source |2017-06-27T19:22:38-07:00Mar 29th, 2017|Categories: Post|Tags: , , |

The ACC developed a Model Information Protection and Security Controls for Outside Counsel Possessing Company Confidential Information (“Model Controls”) to help in-house counsel as they set/manage expectations regarding the types of data security controls vendors should employ to protect client confidential information. Worth a read. Reminds me of a short checklist I provided a few years back regarding cloud computing that was more focused on information security requirements as legal professionals consider working with vendors (http://bit.ly/2ntICVn).

Cybersecurity: Changing Landscape and Opportunities

Source |2017-06-26T18:55:38-07:00Dec 1st, 2016|Categories: Resource|Tags: , |

This ACC webcast examined key developments in cybersecurity law and policy with a look at proposals for new state-level regulations, draft model laws, and ever-tightening requirements for breach notification and response in the US and abroad. The discussion also offered some practical tips on ways that organizations – regardless of size – can take advantage of opportunities to improve their cybersecurity posture through thoughtful participation in sector-specific, regional, and cross-government initiatives.

Third-Party Risk: Creating an Effective Information Security and Data Privacy Assessment Program for Third-party Vendors

Source |2017-06-26T23:59:44-07:00Oct 17th, 2016|Categories: Resource|Tags: , , , |

This ACC program focused on effective information security and data privacy assessment programs for third-party vendors—including practical tips for effectively assessing information security practices and procedures of third-party vendors, such as law firms and other professional consultants — from the pros and cons of using industry-standard questionnaires to determining when onsite reviews are appropriate and how to handle subcontractors.