article thumbnail

Law Firm Cyber Risk: The 5 Ways Cybercriminals Most Likely Will Attack Your Computers — And 7 Things You Can Do

Attorney at Work

These serve as a roadmap to help you and your team navigate data management, including the protection of confidentiality, integrity, and availability. The most common security policies cover disaster recovery planning, acceptable use criteria, and password construction guidelines. Establish IT security policies.

Law Firm 114
article thumbnail

The Analogous Art Doctrine Post-KSR: Insights from the Federal Circuit’s Daedalus Decision

Patently O

This post discusses the analogous arts test and provides key guidance to patent attorneys in today’s post-AIA world. The ‘132 patent, owned by appellant Daedalus, relates to a policy-based data management system for handling files. ” Donner Tech., Pro Stage Gear, LLC , 979 F.3d 3d 1353 (Fed.