Electronic Discovery Privacy

Read Electronic Discovery updates, articles, and commentary from leading lawyers, law firms, and legal consultants:
News & Analysis as of

Massachusetts High Court Permits Compelled Decryption of Seized Digital Evidence

Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more

Avoiding the Digital Dark Age and Remaining Competitive

In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more

The Internet of Things--Avoid Getting Eaten by the Wolf in Sheep's Clothing

With the number of (internet) connected devices rapidly surpassing the number of internet people (actually, all people whether or not connected), we take this opportunity to explore some of the legal complexity brought about...more

Avoiding Litigation: What Every Growing Company Should Know Now — Before It Is Too Late

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

Microsoft Mail and the 4th Amendment: Do Any of Us Seriously Think We Have a Right Not to Have Email Seized as Possible Evidence?

A perspective on the recent Fourth Amendment and privacy considerations raised by Judge James C. Francis' recent Memorandum and Order: 'In The Matter Of A Warrant To Search A Certain E-Mail Account Controlled And Maintained...more

Heartbleed Won’t Bring Cardiac Arrest for Ediscovery

How do you stop a security professional’s heart from beating? Two words: security breach. In today’s “Internet of Everything” environment, the impact of a security breach can be felt around the world and back again…in...more

Socially Aware - Volume 5, Issue 2 - April 2014

In This Issue: - Employer Access to Employee Social Media: Applicant Screening, ‘Friend’ Requests and Workplace Investigations - Driving Under the Influence (of Google Glass) - U.S. Courts’ Evolving Approaches to...more

Cybersecurity Is Not Just an IT Issue; It’s an IG Issue

For leaders and counsel in many organizations, the word “cybersecurity” typically triggers concerns about the IT department, conjuring images of hackers and requiring unfamiliar terminology such as “firewalls” and...more

EDRM Releases A New Model For Analyzing Private Data

Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more

Dear Mr. Snowden: Is it reasonable to expect my attorney-client communications are confidential?

Last month, Edward Snowden provided the press a document describing “how Australian intelligence conducted surveillance of trade talks between Indonesia and the United States and, in the process, monitored communications...more

Isn’t E-Discovery Hard Enough Without the Internet of Things?

This week, after a seemingly endless year of construction, my family and I moved into our new, energy-efficient home. As I was in the kitchen unpacking, my daughter cried out, somewhat dramatically, “Mama, come here…. The...more

Privacy: What the World Has to Say About It

Let’s face it: technology has made the world smaller. It’s no longer extraordinary for what was once termed a “mid-sized” or “regional” company to trade and outsource in foreign markets. Indeed, the Internet has made it...more

What? The Rules Committee Hearings Don’t Have A Hashtag?

On a snowy Sixth Avenue this week, thousands of people packed the New York Hilton Midtown for the sensory overload that is LegalTech New York (#LTNY), the annual E-Discovery, privacy, and information governance bash....more

BYOD: Policy Considerations for Employers in the Age of Personal Devices

Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more

Week in Review - January 16, 2014

This week's headlines charged employers with preserving and protecting data in the workplace. This advice is timely given that this week is “Tax Identity Theft Awareness Week,” a time when employers are reminded to safeguard...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Something Wicked This Way Comes - Dark and Dusty Data and the Risk Your Organization Already Owns

During the final panel of Thomson Reuters’ 17th Annual eDiscovery & Information Governance in Practice Forum, Thomas Barnett, Ignatius Grande, and Sandra Rampersaud led a lively discussion on Managing Big Data, Dark Data, and...more

Discovery Evolutions Hold Promise for Greater Privacy Benefits for Litigants

For most civil litigants, discovery is an unprecedented invasion of privacy. Private letters, notes to one’s self, off-the-cuff emails, financial details and transactions, photographs, and all other forms of memorializing...more

Audit Log Discovery As A Feature Of The Electronic Medical Record

The increased use of electronic medical records ("EMR") is changing not only the way physicians practice medicine but also the way discovery is conducted in medical malpractice lawsuits. Plaintiffs' attorneys seek to...more

Obtaining German Works Council Approval to Collect Employee E-Mail and Electronic Documents Using EnCase® Enterprise and EnCase®...

German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more

BYOD: Party Essentials for Corporations and Employees

The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more

Risky Business: "Bring-Your-Own-Device" And Your Company

Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more

The Nuts And Bolts Of Social Media Discovery

I recently addressed the general implications of the Stored Communications Act on locating and retrieving electronic evidence in a Law360 article entitled “A Hurdle to Obtaining Electronic Evidence.” As explained by the Ninth...more

Jason Maloni on Data Security [Video]

In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more

157 Results
|
View per page
Page: of 7

Follow Electronic Discovery Updates on: