Your Ethical And Legal Duties When Using Wireless Networks

As originally published in Forbes. The cat-and-mouse relationship between technology and the law requires attorneys to examine how their use of new technologies triggers professional duties and responsibilities. This article will focus on attorneys’ use of wireless networks in particular, which is the focus of the The State of California Standing Committee on Professional Responsibility and…

Data Security and Identity Access Management

As originally published in Forbes. Data security is too often discussed at the macro level of data slicing, virtualization, and issues related to public vs. private clouds – extremely important concerns. I have been guilty of this, and of focusing on corporate firewalls and security concerns that arise outside of them (see above). This traditional focus…

Names to Know in Big Data: Hitachi Data Systems (HDS)

As originally published in Forbes on October 25, 2011. Pairing Big Data with business intelligence (“BI” or analytics) is revolutionizing the business world in profound ways and at a dizzying pace. In terms of pure volume, the latest IDC Digital Universal Study reports that more than 1.8 zettabytes—10 to the power of 21 bytes—of information will be…

Don’t Mess With Texans’ Personal Data — Texas Comptroller’s Massive Data Breach Will Cost State Millions

As originally published in Forbes (Apr. 26, 2011). The State of Texas has a really big mess on its hands. In the past week alone, the State has incurred $1.8 million to help mitigate a year-long data breach by the State’s Comptroller’s Office. Personal data of approximately 3.5 million Texans was freely available on a…

How To Make Sure Your Company’s Data Doesn’t Get Stuck In Europe

As originally published in Forbes (Apr. 22, 2011). As debates about data privacy rage in the United States—the Wikileaks Twitter case is a recent and prominent example—it is important for multinational corporations and other potential litigants (both plaintiffs and defendants) not only to understand the nuances of the markedly different privacy definitions and security standards in…