![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/Cyber_Insurance-process-sc66x66-t1558442872.jpg?v=22339d25d4)
Data Breach Incident Response Plan Toolkit
Important forms so you can be prepared in the even of a cyber emergency. Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/risk-management-handouts/Data_Security_Policy-process-sc66x66-t1558442876.jpg?v=22339d25d4)
Data Security Policy - Infographic
Visual summary of the important elements of data security. Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/Icon_Images/Data_Security-process-sc66x66-t1558442877.jpg?v=22339d25d4)
Data Security Policy Practice Guide
Policy designed to protect confidential client data Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/Icon_Images/e-Discovery-process-sc66x66-t1558442878.jpg?v=22339d25d4)
e-Discovery: What Litigation Lawyers Need to Know
Reasonable anticipation, litigation holds, preservation notices Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/Icon_Images/Internet_email-process-sc66x66-t1558442880.jpg?v=22339d25d4)
E-mail, Internet, and the Wireless Age
How to manage your email and securely navigate the internet Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/risk-management-handouts/email-coverimage-process-sc66x66-t1558442875.jpg?v=22339d25d4)
Email, Internet, and the Wireless Age - Infographic
A snapshot of security best practices for email and browsing for your firm. Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/Icon_Images/equipment_disposal-process-sc66x66-t1558442880.jpg?v=22339d25d4)
Office Equipment Disposal Policy
Tips for safely disposing of old office equipment, with available software programs for wiping data, sample policy and forms Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/Icon_Images/SocialMedia_Communications-process-sc66x66-t1558442878.jpg?v=22339d25d4)
Social Media and Crisis Communications Policy
Sample policies tailored to your needs Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/risk-management-handouts/unbundled-legal-service/unbundled-process-sc66x66-t1558442875.jpg?v=22339d25d4)
Unbundled Legal Service
Best practices, limited representation, assisting pro se clients, engagement forms Read More +
![](https://nmcdn.io/e186d21f8c7946a19faed23c3da2f0da/556712d9bf0f4cb2a916cc810687d52b/files/risk-management-resources/Icon_Images/VirtualPractice-process-sc66x66-t1558442878.jpg?v=22339d25d4)
Virtual Law Practice
Setting up a virtual practice, minimizing risk Read More +