Getting past security at the airport is tantamount to being publicly screened and examined. It’s part of the inconveniences suffered for the sake of safety. But how far those searches go and should go is debatable when it comes to seizure of electronic equipment. Frequent travelers should read on for information and applicable solutions.
With so much electronically stored information (ESI), it can be difficult to find the specific answers you are looking for. "Keyword searching" has emerged as a solution to this issue. This article discusses the complicated nature of this solution.
When a company hires an employee away from a competitor, alarms are likely to go off for the in-house counsel. The new employee may be on the up and up, but what happens if your competitor claims that they stole confidential, proprietary, and trade secret information––transferring it all through their email––and are now subpoenaing your company’s computers? Technological advances have made the transferring of such data easy for employees who move around so frequently and in-house attorneys need to know how to respond while protecting their company’s own confidential information.
Opposing counsel can sometimes forget to "scrub" an electronic document clean before sending it for others to view. However, stop and read this article before considering mining the metadata. Ethics rules protect even the forgetful.
Ever heard of Facebook? Chances are some of your employees have, and they may even mention your company name in their profiles. Yes, in-house counsel should be aware of social networking sites, but maybe not in order to police them-but to join them. Find out about this type of online social networking, and explore some of its potential benefits, as well as some of the issues you need to know.
The information revolution is responsible for quantum leaps in productivity and economic prosperity, but a downside has been the rise in a whole new class of crimes. With 8 primary elements, the comprehensive privacy protection and information security program described in this article is centered on people, processes, and technical management that is standards-based whenever possible.
If your company offers internet-related services, you may already appreciate how taking steps to provide users with a safe online experience can build user trust and brand loyalty, both of which can lead to business success. Would your company prefer to be known as the "safe choice" for children on the internet or, alternatively, be publicly identified as a space on the internet where predators go to find children?
It has become crucial for in-house attorneys to pay close attention to application data and compliance issues. Following the numerous reports of security data breaches that left many people with their personal information made public, a need to develop and implement policies and procedures to protect personal information has presented itself. Find out how to strengthen you current policy or get a good one into place.
Corporate privilege has been eroded on several fronts. Lawyers operating in the current legal climate must be keenly aware of the corporate privilege's potential limitations and take steps to minimize them. Here are thirteen steps to cope with corporate privilege erosion.
Read this 2008 Communicator Award-winning article!
General counsel have a lot on their plates, which means they sometimes don't pay as much attention to what the attorneys in various legal functions, including intellectual property, actually do. GC's can, on occasion, fail to pay enough attention to intellectual property and given today's economic realities and recent headlines, such failure can jeopardize careers and lower shareholder value. This article explores why paying more attention to your company's IP is so important.