Follow ACC Docket Online:  

Ten Steps to Protect Privilege in the Event of Data Breach

Cyberattacks have become more commonplace, but still pose one of the greatest risks to any organization’s survival. Therefore, general counsel should establish a plan to protect privilege long before a breach occurs.

 DOWNLOAD PDF 

The information in any resource collected in this virtual library should not be construed as legal advice or legal opinion on specific facts and should not be considered representative of the views of its authors, its sponsors, and/or ACC. These resources are not intended as a definitive statement on the subject addressed. Rather, they are intended to serve as a tool providing practical advice and references for the busy in-house practitioner and other readers.