The noted authority, Sharon D. Nelson, Esq., recently reported in her Ride the Lightning Blog: “Bank Sued Over Court Filing Containing Lawyers’ Personal Information,” a thorny bank litigation case that serves to highlight the critical importance of courts and litigators coming together to jointly adopt state-of-the-art infosecurity software and protocols.
Time for Courts and the Legal Profession to Jointly Adopt State-of-the-Art Infosecurity Solutions
Topics: Differentialsharing, compliance, cybersecurity, softwaresolutions, sensitive data, infosecurity, Differential Sharing, Court Documents
In an article by Victoria Hudgins, writing for LegalTechNews.com, “Sink or Swim: Law Firms Need to Leverage, Understand Tech to Survive,” stated, “For law firms and their in-house partners to survive and thrive, differentiating services and analyzing big data will be key, while understanding and harnessing technology are the first big steps, according to a Wolters Kluwer survey.”
Topics: LegalTechnology, Differentialsharing, LegalTech, cybersecurity, General Counsel, LegalIT, adaptation, legaltecheducation
Legal Industry Should Take the Lead on EDiscovery Security Standards…and More
AJ Shankar, founder and CEO of EverLaw recently wrote in Bloomberg Law, Big Law Business, urging the legal industry to take the lead in establishing eDiscovery Security Standards.
Topics: Differentialsharing, compliance, cybersecurity, datasecurity, unsecured data, sensitive information, sensitive data, security, eDiscovery
Reuters tech/biz writer, Jonathon Stempel, recently reported in “Yahoo strikes $117.5 million data breach settlement after earlier accord rejected,” that the settlement is the largest common fund class action settlement in data breach history. The implications of this settlement (revised from an early attempted settlement in hopes of being more palatable to federal district Judge Lucy Koh) are staggering.
Topics: Differentialsharing, compliance, riskmanagement, databreach, data breach, Yahoo breach, unsecured data, sensitive information, sensitive data, security, risk management, financial risk, Yahoobreach
In the Washington Post article titled “FEMA ‘major privacy incident’ reveals data from 2.5 million disaster survivors,” reporters Joel Achenbach, William Wan, and Tony Room reveal a shocking security failure by the Federal Emergency Management Agency (FEMA). The failure included the unnecessary and unauthorized sharing of personal information, including banking details and home addresses, of disaster victims from the 2017 California wildfires and Hurricanes Harvey, Irma and Maria.
Topics: Insider, Differentialsharing, compliance, softwaresolutions, datasecurity, sensativedata, databreach, FEMA
Today’s General Counsel recently commented on tech-security writer Jason Kichen’s article published in securityboulevard.com, “Want to Weed Out Anomalies? Use an Adversary Mindset,” raising awareness for General Counsel of the cybersecurity phenomenon known as “anomaly deluge.”
Topics: Differentialsharing, cybersecurity, Anomalydeluge, Anomalies, AI, datasecurity
Manafort Redaction Disaster Revisited: State-of-the-Art Infosecurity Software Would Have Prevented It (and could have fixed and tracked it)
Jason Tashea’s 1/10/19 article in the ABA Journal online, “How to redact a PDF and protect your clients,” further affirms the dangers of legacy software, underestimating technology risk, and mindset; yet it fails to identify current Infosecurity software solutions.
Topics: WindTalker, Differentialsharing, Manafort, LegalTech, redaction, softwaresolutions, securityrisk, riskmanagement
The Manafort Redaction Disaster Could Have (And Should Have) Been Prevented with Technology And Education
Louise Matsakis’ 1/9/19 article in Wired, “Paul Manafort Is Terrible with Technology,” and L.V. Anderson’s 1/8/19 article in Digg, “Lawyers File Response to Mueller Claims, Accidentally Fail to Properly Redact The Secret Stuff,” eloquently converge to illustrate the dangers of legacy software and mindset.
Topics: WindTalker, LegalTechnology, Differentialsharing, Manafort, LegalTech, compliance, cybersecurity, redaction