James Sherer

BakerHostetler

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Are you—or someone you love—a content hoarder?

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

9/18/2014 - Electronically Stored Information

Are You Facing the Prospect of a Merger Investigation?

If your organization is facing the prospect of a merger investigation and your lawyers haven’t raised the prospect of technology-assisted document review (“TAR”), then maybe you should be talking with someone...more

5/8/2014 - Document Review Internal Investigations Mergers Predictive Coding Software Subject Matter Experts Technology-Assisted Review

What? The Rules Committee Hearings Don’t Have A Hashtag?

On a snowy Sixth Avenue this week, thousands of people packed the New York Hilton Midtown for the sensory overload that is LegalTech New York (#LTNY), the annual E-Discovery, privacy, and information governance bash....more

2/7/2014 - Marketing

Information Governance – The importance of putting your data house in order

Information is the lifeblood of businesses today. As the volume of data continues to grow exponentially, intelligent governance of information is essential for enterprises to survive and thrive. Data security concerns,...more

2/6/2014 - Cybersecurity Data Breach Data Protection

E-Discovery in 2013 – Waiting for Godot, Closing Kimonos, and Your World Doesn’t Just Seem Bigger

In some respects, 2013 seemed like a conversation between Vladimir and Estragon. Some commentators likened it to a simple, unified message that finally had E-Discovery practitioners, litigators in general, and affected...more

1/2/2014 - Big Data Data Retention Discovery Information Governance Metadata Predictive Coding Spoliation

International Privacy - 2013 Year in Review

2013 was a year in contrasts within data privacy. To begin with the “normal” course, Canada sought (but failed) to pass a mandatory breach notification amendment to its federal privacy law, and Uruguay acceded to the European...more

12/30/2013 - Data Breach Data Protection Edward Snowden Notice Requirements NSA Personally Identifiable Information Surveillance

International Privacy - 2013 Year in Review - Ukraine

Ukraine privacy law is undergoing a dramatic shift with its introduction of new legislation, “On Amending Certain Legislative Acts of Ukraine Regarding Improving the System of Personal Data Protection,” enacted on July 3,...more

12/30/2013 - Consent Data Protection EU Notice Requirements Personally Identifiable Information

International Privacy - 2013 Year in Review - Canada

This fall, Canadian Parliament failed to pass proposed amendments to its federal privacy law that would impose a mandatory breach notification requirement. Bill C-12, originally introduced in 2010 and reintroduced in 2011,...more

12/30/2013 - Breach Notification Rule Canada Data Breach Data Protection Notice Requirements Personally Identifiable Information PIPEDA

International Privacy - 2013 Year in Review - Africa

On August 22, 2013, after four years of deliberation, the South African Parliament passed the first comprehensive data protection legislation in South Africa, the Protection of Personal Information (POPI) Bill. This Bill...more

12/30/2013 - Africa Consent Data Collection Data Protection Disclosure Requirements Personally Identifiable Information

International Privacy - 2013 Year in Review - European Union

Outside of the EU, concerns continue after the former NSA contractor Edward Snowden leaks demonstrated issues related to U.S. handling of European data. Beginning in July, 2013, the ongoing Transatlantic Trade and Investment...more

12/30/2013 - Contractors Cybersecurity Data Protection Edward Snowden EU EU Data Protection Laws European Commission NSA Surveillance TTIP

International Privacy - 2013 Year in Review - Central and South America

1. Costa Rica - On March 5, 2013, Costa Rica’s data protection law, originally passed in 2011, came into force. The law, the Ley Protección de la Persona frente al tratamiento de sus datos personales, Law...more

12/30/2013 - Breach Notification Rule Data Breach Data Collection Data Processors Data Protection Latin America NSA Personally Identifiable Information PRISM Program

International Privacy - 2013 Year in Review - Asia

1. China - China’s Personal Information Protection Law Proposal was submitted to the State Council in 2008, which was followed by the Ministry of Industry and Information Technology’s non-binding Internet...more

12/30/2013 - Asia China Data Collection Data Processors Data Protection Hong Kong India Japan Personally Identifiable Information

Information Governance - 2013 in Review

2013 was the year that the term "Information Governance" or "IG" began to be widely used outside of technical circles. Despite that fact, the concept of IG is not well understood. Gartner, a premier information advisory...more

12/27/2013 - Big Data Bring Your Own Device Data Breach Data Protection Information Governance Information Management Mobile Device Management

Something Wicked This Way Comes - Dark and Dusty Data and the Risk Your Organization Already Owns

During the final panel of Thomson Reuters’ 17th Annual eDiscovery & Information Governance in Practice Forum, Thomas Barnett, Ignatius Grande, and Sandra Rampersaud led a lively discussion on Managing Big Data, Dark Data, and...more

12/16/2013 - Data Collection

14 Results
|
View per page
Page: of 1