News & Analysis as of

Electronic Discovery General Business Science, Computers & Technology

Read Electronic Discovery updates, articles, and commentary from leading lawyers, law firms, and legal consultants:

The Impact of Cybersecurity Concerns on M&A Activities is Growing: eDiscovery Trends

by CloudNine on

This is the second story that I’ve covered in the past several months where cybersecurity concerns impacted merger and acquisitions. See below for more on the first one… After Verizon Communications took a $350...more

Now, We Have a Privacy Shield with the Swiss Too: eDiscovery Trends

by CloudNine on

This appears to be our week to cover privacy stories on the blog. First, The Sedona Conference® (TSC) released the public comment version of its new Data Privacy Primer (which we covered on Tuesday). Also, last week, U.S....more

Three Tips to Verify the Security of Your E-Discovery Software

by Zapproved Inc. on

SOC 2® Type 2 Certification and Zapproved–Building Trust and Confidence that Your Data is Secure - Today in e-discovery, it should be no surprise that cyber security is a rising concern among corporate leaders and that...more

The European, Middle Eastern and African Investigations Review 2016: United Kingdom: handling internal investigations

by WilmerHale on

With so much potentially at stake, the initial steps and strategic decisions taken in any company investigation are critical to setting the tone for a focused, credible and effective inquiry. This is paramount not only for...more

I am not a Crook: Avoiding the Politics of Data Preservation with a Defensible E-Discovery Process

by Exterro, Inc. on

Of course we've all heard about Hillary's emails, and Trump certainly has email trouble of his own. For a while, Politwoops kept track of mistweets and other online regrets even after they were deleted until Twitter (and...more

Benchmark surveys: GCs, Executives Not Prepared to Defend Against Cyberbreaches - Key Protective Steps

by DLA Piper on

Although cybersecurity has become a more prominent issue for executives and boards of directors, three recent benchmark surveys - the BDO Board Survey, the 2015 Consero Group’s General Counsel Data Survey, and the 2015 US...more

Expanding Cybersecurity Safeguarding Requirements, Reporting Obligations, and Cloud-Based Security: A Brief Guide to Understanding...

by McCarter & English, LLP on

The United States Department of Defense promulgated an “interim” rule, effective August 26, 2015, which placed imposing and costly burdens on all DoD contractors and subcontractors (including small businesses and commercial...more

Lessons Learned from Target’s Data Breach Discovery Win - Five Strategies for Maintaining Privilege in the Aftermath of a Data...

by Poyner Spruill LLP on

A thousand questions immediately flood any lawyer’s mind when they first hear that their client may have been affected by a data breach. How did it happen? What data were affected? Was there any personal information affected,...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

by Morgan Lewis on

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Back to School: A Primer on Cross-Border Discovery Issues

by Conduent on

In September, the Sedona Conference released its latest publication on e-discovery matters, Practical In-House Approaches for Cross-Border Discovery & Data Protection, for public comment. The publication addresses a number of...more

Client Alert: Sex, Money and Cybersecurity - Reminders for Public Companies

by GableGotwals on

Recent events have highlighted the importance of comprehensive cyber-security programs for publicly-traded companies. Although the circumstances differ, in each case the impact of employee behavior with electronic...more

Pardon the “Intrusion” – Cybersecurity Worries Scuttle Wassenaar Changes

Companies concerned about their cybersecurity posture can breathe a small sigh of relief, as the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) recently announced it was scrapping plans to implement new...more

New survey shows continued lack of executive confidence in cybersecurity and increases in data loss

A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

Assuring Regulatory Compliance Doesn’t Get Lost in Translation

by Conduent on

With the expansion of large multinational corporations into developing countries such as Russia, Brazil, India, Mexico and China, a proliferation of global regulatory enforcement actions, including anti-bribery and...more

Streaming At The Edge Of The Law

by Conduent on

One of this year’s themes at the South by Southwest (SxSW) festival is “Surviving the Shift: Rethinking Music and Data.” The music industry is transforming itself as the trend in buying music shifts from digital download to...more

Business information and data processing: tidbits on the draft Code of Conduct

by DLA Piper on

On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more

Taking a Forward-Looking Approach to Enterprise Risk Management

by Conduent on

Traditionally, organizations have taken a backward-looking approach to risk, evaluating potential hazards on a siloed, departmental basis after a loss of assets. Organizations often take few proactive steps to detect risks,...more

2014 Information Governance Year in Review

by BakerHostetler on

2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more

Don’t Be the Next Data Breach Target

by Conduent on

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

Data Center Contracts: Privacy and Security Terms

by Snell & Wilmer on

A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more

How EU data protection laws impact cross-border FCPA investigations

by DLA Piper on

EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more

Are you—or someone you love—a content hoarder?

by BakerHostetler on

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Fitting a Solution to Meet the Needs of a Workflow In-House

by Conduent on

Your law firm just purchased a license for e-discovery software. Now what? Software implementations can be a substantial challenge for a variety of reasons, including lack of executive buy-in, poorly defined requirements,...more

Cloud Computing Is a Hot Topic… in Business and the Courtroom

Cloud computing sales are poised to triple by 2017, according to IHS Technology. With growth comes competition and the potential for disputes, both intellectual property-related and otherwise. This article surveys some of the...more

43 Results
|
View per page
Page: of 2
Cybersecurity

Follow Electronic Discovery Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.

Feedback? Tell us what you think of the new jdsupra.com!