The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Professionals
Select a format
Select subscription type
Terms & conditions
Subscribers receive the product(s) listed on the Order Form and any Updates made available during the annual subscription period. Shipping and handling fees are not included in the annual price.
Subscribers are advised of the number of Updates that were made to the particular publication the prior year. The number of Updates may vary due to developments in the law and other publishing issues, but subscribers may use this as a rough estimate of future shipments. Subscribers may call Customer Support at 800-833-9844 for additional information.
Subscribers may cancel this subscription by: calling Customer Support at 800-833-9844; emailing firstname.lastname@example.org; or returning the invoice marked "CANCEL".
If subscribers cancel within 30 days after the product is ordered or received and return the product at their expense, then they will receive a full credit of the price for the annual subscription.
If subscribers cancel between 31 and 60 days after the invoice date and return the product at their expense, then they will receive a 5/6th credit of the price for the annual subscription. No credit will be given for cancellations more than 60 days after the invoice date. To receive any credit, subscriber must return all product(s) shipped during the year at their expense within the applicable cancellation period listed above.
For many, the issues of cyber and data security may have seemed to creep up on us. For others, it has been more like a two-by-four hitting us in the face. In fact, it has been a series of threats, building over the course of years that has left us in our current, potentially vulnerable, position.In the 1990s and the earlier part of the last decade, computer security problems were mostly attributable to internal failings (mistakes in computer configuration, accidental loss of laptops, and some employee malfeasance), and to a lesser extent, malicious actions by outsiders. Sometimes called "script kiddies," these outsiders were individuals using commonly available computer tools to test the defenses of corporate and government computers. Most of these early security failures had limited impact. Back then, there were few organized, systematic, or sophisticated attacks on corporations' computer security, and legal exposure, including that of law firms and other practices, seemed entirely absent and unlikely. There was some complacency with the sense that most cyber attacks were against the government, rather than specific corporations or law firms. This has changed. The most recent Verizon Data Breach Investigations Report notes that security losses due to insiders or loosely organized groups are now dwarfed in size by the actions of organized groups using highly sophisticated and effective tools. Worse, law firms, government law departments, and other similarly situated organizations have become prime targets. Lawyers have limited resources to dedicate to computer security, may not have a sophisticated appreciation of the associated technology risks, and lack an instinct for cybersecurity. Lawyers have become "soft targets in the hunt for insider scoops on mergers, patents, and other deals." At the same time, law firms may not only be soft targets, they may also be attractive targets --- if they are known to have a large corporate client base, an attacker may be drawn to them, like a bee to honey. While the corporate clients themselves may have sophisticated computer security defenses, their law firms' defenses are probably weaker. And once inside a law firm's defenses, the intruder likely has access to all of the firm's client information.
The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals provides practical cyber threat information, guidance, and strategies to lawyers and law firms of all sizes. The guide considers the interrelationship between lawyer and client, establishing what legal responsibilities and professional obligations are owed to the client in the event of a cyber attack. The book provides strategies to help law firms defend against the cyber threat, and also offers information on how to best to respond if breached.
eBooks, CDs, downloadable content, and software purchases are non-cancellable, nonrefundable and nonreturnable. Click here for more information about LexisNexis eBooks. The eBook versions of this title may feature links to Lexis+™ for further legal research options. A valid subscription to Lexis+™ is required to access this content.
Table of contents
Chapter 1 Purpose of This Handbook
Chapter 2 Understanding Cyber and Data Security Risks and
Chapter 3 Data Security and Lawyers' Legal and Ethical
Chapter 4 Understanding the Practice Setting
Chapter 5 Best Practices for Incident Response and Cyber Coverage
Chapter 3, Section II Appendices
Appendix A. Federal Statutes 199
Appendix B. State Statutes 201
Appendix C. Federal Regulations 207
Appendix D. Court Decisions 211
Appendix E. FTC Decisions and Consent Decrees 212
Chapter 3, Section III Appendices
Appendix F. ABA Formal Ethics Opinions
Appendix G. Outsourcing
Appendix H. Cloud Computing
Appendix I. Metadata