2016 Law Firm Data Breaches

Posted on

Information security begins with a risk assessment to determine what needs to be protected and the threats it faces. Commentary [18] to Model Rule 1.6 provides a risk assessment approach to determine the appropriate measures that lawyers should apply. The first two factors in the analysis are “the sensitivity of the information” and “the […]

Read More