Articles on Security

Cybersecurity Best Practices By Adam Ford & Jenifer L. Johnson Legal Technology, Standing Committee on, May 2022 With the rash of recent cybersecurity attacks nationwide, cyber hygiene has never been more important for government lawyers.
Cybersecurity Best Practices By Adam Ford & Jenifer L. Johnson Government Lawyers, August 2021 With the rash of recent cybersecurity attacks nationwide, cyber hygiene has never been more important for government lawyers.
Department of Labor Retirement Plan Cybersecurity Guidance By Bernard G. Peter Corporate Law Departments, June 2021 A summary of the cybersecurity tips issued by the U.S. Department of Labor's Employee Benefits Security Administration.
Cyber Security for Tax Professionals By Nancy Franks-Straus Federal Taxation, December 2019 A summary of items practitioners need to consider in order to create a data security plan to protect sensitive client information.
Security checkup By Don Mateer Senior Lawyers, June 2018 Suggestions for safeguarding your online accounts, browsing more securely, and securing your internet connection.
2 comments (Most recent June 25, 2018)
Breach Notification Laws—What every business owner needs to know By Gary Zhao & Peter Maris Racial and Ethnic Minorities and the Law, October 2011 For any multi-state or nationwide business, preventing information security breaches is most likely the easiest and cheapest way to comply with breach notification laws.
Breach Notification Laws—What every business owner needs to know By Gary Zhao & Peter Maris Business Advice and Financial Planning, February 2011 For any multi-state or nationwide business, preventing information security breaches is most likely the easiest and cheapest way to comply with breach notification laws.
E-mail encryption By Benjamin Gerber & Adam Nelson Legal Technology, Standing Committee on, August 2008 In this article, we will look at another use for cryptography in your everyday activities, encryption of communications, specifically of e-mail and e-mail attachments. We will then explain how to get started using encryption features in two of the most popular e-mail clients, Outlook and Thunderbird.

Select a Different Subject