Electronic Discovery Privacy

Read Electronic Discovery updates, articles, and commentary from leading lawyers, law firms, and legal consultants:
News & Analysis as of

Behind the Great Firewall Of Ediscovery In Asia

When dealing with US requests for data subject to ediscovery rules in Asia, corporate counsel at multinational corporations must be on top of their game. Managing ediscovery in the United States alone presents a significant...more

Feds Pose Privacy Risk by Grabbing Overseas ISP E-mails

Microsoft Corp. is appealing the recent decision of U.S. District Judge Loretta A. Preska which requires the company to disclose the contents of e-mails stored at a data center in Dublin, Ireland, in compliance with a warrant...more

The Uber Playbook: 5 Best Practices for Protecting Data Privacy

The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more

7th Cir. Confirms Protections for Sealing Parties' Confidential Documents

A common concern for business litigants is protecting legitimately confidential matter contained in documents produced during discovery from dissemination to non-parties. The Supreme Court’s decision in Seattle Times Co. v....more

Federal District Court Decision in Microsoft Case re Warrants for Content Stored Outside US

On July 31, the district court judge issued a ruling in the case involving the US Government’s warrant issued to Microsoft to compel production of data stored on the servers of its wholly owned Irish subsidiary located in...more

Wearable Technology: A Perfect Fit For Litigation

It should come as no surprise that wearable technology and fitness trackers, such as Google Glass, the Jawbone UP, and the Narrative Clip are saturating the consumer market, and as a result, consumers are increasingly...more

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

Microsoft Loses Round in Fight Over Email Held in Irish Data Center

Rarely do Microsoft, AT&T, Verizon, Apple, Cisco and the ACLU all agree on a particular subject; rarer still that such an unlikely coalition fails....more

SDNY Judge Orders Microsoft to Produce Emails Stored Abroad

Chief Judge Loretta A. Preska of the U.S. District Court for the Southern District of New York affirmed Magistrate Judge James C. Francis IV’s opinion and ordered that the U.S. Department of Justice (DOJ) could compel...more

Second Circuit Finds Fourth Amendment Violation in Law Enforcement Retention of Computer Files Not Within Scope of Search Warrant

On June 17, 2014, the United States Court of Appeals for the Second Circuit issued a significant Fourth Amendment decision in United States v. Ganias. The decision is premised on the well-established notion that, because of...more

What’s in Your Wallet? Who Cares—What’s in Your Cell Phone Is More Important!

The United States Supreme Court has tackled the issue of cell phone privacy and ruled that data is different from other forms of technology. In late June, the Supreme Court issued an opinion: those of David Riley, a...more

Facebook: What Exactly are We Sharing When We Update Our Statuses?

Facebook’s newest feature may have you thinking twice about your status updates. However it’s not what you write that you should worry about, but rather where you write it. The social media giant has unveiled the latest...more

Massachusetts High Court Permits Compelled Decryption of Seized Digital Evidence

Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more

Avoiding the Digital Dark Age and Remaining Competitive

In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more

The Internet of Things--Avoid Getting Eaten by the Wolf in Sheep's Clothing

With the number of (internet) connected devices rapidly surpassing the number of internet people (actually, all people whether or not connected), we take this opportunity to explore some of the legal complexity brought about...more

Avoiding Litigation: What Every Growing Company Should Know Now — Before It Is Too Late

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

Microsoft Mail and the 4th Amendment: Do Any of Us Seriously Think We Have a Right Not to Have Email Seized as Possible Evidence?

A perspective on the recent Fourth Amendment and privacy considerations raised by Judge James C. Francis' recent Memorandum and Order: 'In The Matter Of A Warrant To Search A Certain E-Mail Account Controlled And Maintained...more

Heartbleed Won’t Bring Cardiac Arrest for Ediscovery

How do you stop a security professional’s heart from beating? Two words: security breach. In today’s “Internet of Everything” environment, the impact of a security breach can be felt around the world and back again…in...more

Socially Aware - Volume 5, Issue 2 - April 2014

In This Issue: - Employer Access to Employee Social Media: Applicant Screening, ‘Friend’ Requests and Workplace Investigations - Driving Under the Influence (of Google Glass) - U.S. Courts’ Evolving Approaches to...more

Cybersecurity Is Not Just an IT Issue; It’s an IG Issue

For leaders and counsel in many organizations, the word “cybersecurity” typically triggers concerns about the IT department, conjuring images of hackers and requiring unfamiliar terminology such as “firewalls” and...more

EDRM Releases A New Model For Analyzing Private Data

Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more

Dear Mr. Snowden: Is it reasonable to expect my attorney-client communications are confidential?

Last month, Edward Snowden provided the press a document describing “how Australian intelligence conducted surveillance of trade talks between Indonesia and the United States and, in the process, monitored communications...more

Isn’t E-Discovery Hard Enough Without the Internet of Things?

This week, after a seemingly endless year of construction, my family and I moved into our new, energy-efficient home. As I was in the kitchen unpacking, my daughter cried out, somewhat dramatically, “Mama, come here…. The...more

Privacy: What the World Has to Say About It

Let’s face it: technology has made the world smaller. It’s no longer extraordinary for what was once termed a “mid-sized” or “regional” company to trade and outsource in foreign markets. Indeed, the Internet has made it...more

What? The Rules Committee Hearings Don’t Have A Hashtag?

On a snowy Sixth Avenue this week, thousands of people packed the New York Hilton Midtown for the sensory overload that is LegalTech New York (#LTNY), the annual E-Discovery, privacy, and information governance bash....more

169 Results
|
View per page
Page: of 7

Follow Electronic Discovery Updates on: