US Law: Commercial vs. Recreational Use of Drones

In a post last Fall, I demonstrated the capabilities of my inexpensive drone and suggested that an imaginative attorney could find lots of ways to use such a drone in a law practice. I did not, however, address the legalities of using private drones for commercial purposes.  For now, it is an open question whether the commercial use of drones … Read More

First Steps in Case of Suspected Data Breach

Okay, the breaking glass part is for dramatic effect and is optional.  However, once the specter  of a data breach rears its ugly head, your company should  immediately retain experienced breach counsel before it hires cyber security and forensics firms to access the scope of the breach.  Why?  Because if the law firm truly directs and manages the internal investigation … Read More

IN CASE OF DATA BREACH EMERGENCY: STEP 1- BREAK GLASS AND HIRE BREACH LAWYERS TO PRESERVE PRIVILEGE

Okay, the breaking glass part is for dramatic effect and is optional.  However, once the specter  of a data breach rears its ugly head, your company should  immediately retain breach counsel before it hires cyber security and forensics firms to access the scope of the breach.  Why?  Because if the law firm truly directs and manages the internal investigation and … Read More

Responding to a Data Breach— Best to Have Your Plan in the Can

Reports that there has been yet another data breach or malicious hacking attack targeting the personal and financial information of thousands or even millions of consumers have become so common they barely constitute news.  For most companies and yes, law firms, the question is not if a significant data breach or hacking attack is in their future, but instead when.   Is your … Read More

New SpiderOak Hive Works Like Dropbox and is a Better Ethical Choice for Lawyers

Lawyers have an ethical obligation to take reasonable steps to protect their clients’ confidential information.   This has become a significant challenge in light of daily revelations of data breaches and cyber attacks by individuals and criminal rings, hacking by foreign governments, and now news that the United States Government is collecting massive amounts of data from a wide variety of … Read More