When a company hires an employee away from a competitor, alarms are likely to go off for the in-house counsel. The new employee may be on the up and up, but what happens if your competitor claims that they stole confidential, proprietary, and trade secret information––transferring it all through their email––and are now subpoenaing your company’s computers? Technological advances have made the transferring of such data easy for employees who move around so frequently and in-house attorneys need to know how to respond while protecting their company’s own confidential information.
Opposing counsel can sometimes forget to "scrub" an electronic document clean before sending it for others to view. However, stop and read this article before considering mining the metadata. Ethics rules protect even the forgetful.
The information revolution is responsible for quantum leaps in productivity and economic prosperity, but a downside has been the rise in a whole new class of crimes. With 8 primary elements, the comprehensive privacy protection and information security program described in this article is centered on people, processes, and technical management that is standards-based whenever possible.
It has become crucial for in-house attorneys to pay close attention to application data and compliance issues. Following the numerous reports of security data breaches that left many people with their personal information made public, a need to develop and implement policies and procedures to protect personal information has presented itself. Find out how to strengthen you current policy or get a good one into place.
Corporate privilege has been eroded on several fronts. Lawyers operating in the current legal climate must be keenly aware of the corporate privilege's potential limitations and take steps to minimize them. Here are thirteen steps to cope with corporate privilege erosion.
Read this 2008 Communicator Award-winning article!
General counsel have a lot on their plates, which means they sometimes don't pay as much attention to what the attorneys in various legal functions, including intellectual property, actually do. GC's can, on occasion, fail to pay enough attention to intellectual property and given today's economic realities and recent headlines, such failure can jeopardize careers and lower shareholder value. This article explores why paying more attention to your company's IP is so important.
A lack of understanding about your company's data management system can land you in hot water. There are ways to improve communication between in-house lawyers and the information technology group before and after receipt of document requests. Prepare your organization so when you respond to an electronic data request, you can avoid potential pitfalls.
Get a judge's perspective from the bench. What do lawyers overlook during ediscovery? Find out about ediscovery trends that will help you when the time arrives.
Table defining roles and responsibilities by data category.
As companies grow increasingly reliant on their IT systems, they have turned to third party providers to alleviate some infrastructure concerns. Learn more about how to choose an outside contractor so that your company's information is safeguarded while still meeting your budget forecasts.