Skip to Content
Menu Toggle
subscribe to legal alerts

subscribe to our blogs

sign up now

connect with us

  1. Facebook
  2. twitter
  3. LinkedIn
  4. Youtube

Media Contacts

Charles B. Jimerson
Managing Partner

Nikos Westmoreland
Director of Business Development

Jimerson Birr welcomes inquiries from the media and do our best to respond to deadlines. If you are interested in speaking to a Jimerson Birr lawyer or want general information about the firm, our practice areas, lawyers, publications, or events, please contact us via email or telephone for assistance at (904) 389-0050.

How to Prevent Public Access to Confidential Business Information Through Motions to Seal Records

March 18, 2021 Communications & Media Industry Legal Blog, Manufacturing & Distribution Industry Legal Blog, Technology Industry Legal Blog

In Florida, the public and press have a fundamental right of access to judicial proceedings, which includes access to documents submitted to the court. This may be troublesome for businesses seeking to maintain the confidentiality of sensitive information, such as trade secrets or other proprietary information. However, under certain circumstances, […]

Cyber Crime and Computer Fraud Insurance: Is Your Business Covered?

March 24, 2020 Florida Business Litigation Blog, Insurance Industry Legal Blog, Technology Industry Legal Blog

In today’s digital world, there are many scams that fraudsters employ to steal money and information from your company.  Those computer-based scams include hacking, phishing, ransom-ware, and spoofing to name only a few. The first step in protecting against these cyber crimes is to have the appropriate information technology and […]

A Three Step Guide to Complying with Applicable Law When Your Data Has Been Breached

July 13, 2017 Professional Services Industry Legal Blog, Technology Industry Legal Blog

Regulatory Compliance causes many companies to proactively deal with information security. There are multiple federal laws that impact and regulate the protection of Personally Identifiable Information (“PII”)[1], some of the most well-known being GLBA[2] (regulating financial institutions), HIPAA[3] (regulating the healthcare industry), SOX[4] (regulating US public company boards, management and […]

E-Discovery Terminology for Every Litigator

March 7, 2017 Professional Services Industry Legal Blog, Technology Industry Legal Blog

On September 29, 2016 the Florida Supreme Court amended rules 4-1.1 and 6-10.3 to the Rules Regulating The Florida Bar. As a result, Florida attorneys will now be required to obtain 3 credit hours of CLE in approved technology programs. Further, language was added to the Comment to Rule 4.1.1 Competence, which reads as follows:

Competent representation may also involve the association or retention of a non-lawyer advisor of established technological competence in the field in question. Competent representation also involves safeguarding confidential information relating to the representation, including, but not limited to, electronic transmissions and communications.

What does this mean for litigators dealing with electronic evidence? I like to say that the realm of eDiscovery is a melding of legal and IT, two groups of professionals who speak different languages, and who under typical circumstances do not care to speak the language of the other. We have all heard that attorneys speak legalese, and we know of the “IT speak” that flies over the heads of IT industry outsiders. How can we manage the additional eDiscovery industry terminology that is a necessary part of the conversations between IT and legal that surround litigation or a government investigation? At the time of my entry into the field of eDiscovery in 2013, I had not even heard of the term metadata, much less jargon like DeNIST, TIFFing, load file, and so on.

The Computer Fraud and Abuse Act and its Application in Florida Courts

January 21, 2014 Professional Services Industry Legal Blog, Technology Industry Legal Blog

Since the advent of the computer era and its infectious spread throughout the technological world we know today, the possibility for computer related fraud has always existed. With the rise of the internet, access to all kinds of information had never been easier or faster. Even top secret information from intelligence agencies of the United States were at risk and vulnerable to hackers or people simply looking for some at-home entertainment. To a hacker, the world was at their fingertips, literally. This Blog post seeks to explore some of the laws implicated by illegal hacking and what civil remedies victims are afforded.

we’re here to help

Contact Us