article thumbnail

The Writings on the Blackbaud: Lessons from the FTC’s First Standalone Section 5 Unfairness Claim

Berkley Technology Law Journal

Compounding these security failures, Blackbaud also neglected to enforce its own data retention policies, retaining consumer data long past any legitimate business need. The attacker navigated Blackbauds servers undetected for nearly three months until the company identified a suspicious login on a backup server.

article thumbnail

The Security ‘Scapegoat?’: When Liability Comes Knocking, CISOs Answer the Call

Berkley Technology Law Journal

The SEC argued that SolarWinds had falsely portrayed its cybersecurity practices as robust and industry-compliant despite internal documentation indicating otherwise. By Gaurav Lalsinghani, J.D. Tasked with overseeing a firms cybersecurity posture, CISOs stand on the front lines of a corporations digital defense.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In Case of ‘Real Lawyers Against A Robot Lawyer,’ Federal Court Dismisses Law Firm’s Suit Against DoNotPay for Unauthorized Law Practice

Above the Law - Technology

“While the complaint asserts that DNP has provided poor customer service at times, leading to adverse legal consequences for DNP’s customers, the complaint fails to cite any instance where DNP’s failures were imputed to MK specifically or lawyers generally.” District Chief Judge Nancy Rosenstengel.

Court 275
article thumbnail

Social Security Disability Claims: Process and Practice

MatterSuite

At this stage, legal representatives are useful in ensuring that the SSA claim number is recorded correctly and all the required social security documents are produced. They can advocate for their clients by ensuring all necessary documents, medical opinions, and expert testimonies are submitted.

article thumbnail

Custodian Interviews: Critical to Defensible eDiscovery in the Age of Modern Communications

CloudNine

Failure to identify a source through interviews could result in data loss. Uncover key facts and terminology, because speaking to custodians often reveals context that is not obvious from documents alone. recognizing a code word in emails that filters irrelevant documents).

article thumbnail

The Clock is Ticking: How to Miss Fewer Court Deadlines

Attorney at Work

After one of the clients notified him of the dismissal, the alarmed attorney filed a motion to reconsider and reinstate the case, attributing his failure to respond in a timely manner to “new filtering rules in his email inbox,” which moved the dismissal order to his junk mail folder. The firm had filed a voluntary dismissal back in 2014.

Court 132
article thumbnail

Guest post: How GCs can support the CFO in the wake of the Silicon Valley Bank failure

Legal IT Insiders

Even during a monumental crisis – such … Guest post: How GCs can support the CFO in the wake of the Silicon Valley Bank failure Read More » The post Guest post: How GCs can support the CFO in the wake of the Silicon Valley Bank failure appeared first on Legal IT Insider.