Be My Host: What To Ask About Free Services That May Be Hosting Your Data

Read the full article (PDF) >

Traditionally, privacy and cybersecurity efforts have focused on how companies can protect their IT assets from intrusion. Literally billions of dollars have been invested in developing security measures that limit and control access to servers, workstations, laptops and mobile devices. But in today’s cloud-computing environment, these extensive (and expensive) efforts may not be sufficient. The true objective is not to protect the IT assets, but the data that they store. And with increasing frequency, employees are storing sensitive, proprietary data on assets that their companies do not control. Thus, to capture and address this extra-company activity, a comprehensive approach to data privacy and cybersecurity needs to be data-centric rather than asset-centric.

Reprinted with permission from InsideCounsel.

The articles on our Website include some of the publications and papers authored by our attorneys, both before and after they joined our firm. The content of these articles should not be taken as legal advice.