Electronic Discovery Privacy

Read Electronic Discovery updates, articles, and commentary from leading lawyers, law firms, and legal consultants:
News & Analysis as of

Back to School: A Primer on Cross-Border Discovery Issues

In September, the Sedona Conference released its latest publication on e-discovery matters, Practical In-House Approaches for Cross-Border Discovery & Data Protection, for public comment. The publication addresses a number of...more

When E-Filing Goes Wrong: How to Protect Your Trade Secrets in the Event of Inadvertent Online Disclosure

It is frightening to think that valuable corporate trade secrets could be lost with the click of a mouse. But as electronic court filing becomes increasingly prevalent, the risk of inadvertent disclosure of sensitive...more

A Light in the Dark: Protecting PII in Ediscovery

65% of ediscovery projects contain at least one document with the XXX-XX-XXXX number format. Accidentally disclosing Personally Identifiable Information (PII) could lead to a messy discovery process and costly penalties. Do...more

Data Subject Access Requests – Stick to What’s Reasonable, Proportionate, and Has the Proper Motive, Says UK Court

In August, the High Court, in Dawson-Damer & Ors v Taylor Wessing [2015] EWHC 2366 (Ch), refused an application to compel a UK law firm (“TW”) to comply with a data subject access request (“DSAR”) under the Data Protection...more

Client Alert: Sex, Money and Cybersecurity - Reminders for Public Companies

Recent events have highlighted the importance of comprehensive cyber-security programs for publicly-traded companies. Although the circumstances differ, in each case the impact of employee behavior with electronic...more

Pardon the “Intrusion” – Cybersecurity Worries Scuttle Wassenaar Changes

Companies concerned about their cybersecurity posture can breathe a small sigh of relief, as the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) recently announced it was scrapping plans to implement new...more

New survey shows continued lack of executive confidence in cybersecurity and increases in data loss

A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more

Judges Examine Key Differences between U.S. and European E-Discovery

Exterro’s inFusion `15 user conference kicked off with a fascinating keynote on the differences between e-discovery laws in the U.S. and Europe. What made the discussion so interesting was that it featured two judges with a...more

Social Media E-Discovery: Are Your Facebook Posts Discoverable in Civil Litigation?

Judge Richard J. Walsh began his opinion in Largent v. Reed with the following question: “What if the people in your life want to use your Facebook posts against you in a civil lawsuit?” With the explosive growth of social...more

Five Drivers of E-Discovery in the APAC Region

In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more

Target and Visa reach $67M settlement

Visa, Inc. announced on August 18th that it has reached a settlement with Target for $67 million to reimburse Visa for costs associated with the Target data breach in late 2013, including issuing millions of new cards to...more

Hacking Your Health: For Healthcare Providers, Risk Analysis Must Be Ongoing

Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more

UK Insurers Probed for Cyber Risk

The UK's Prudential Regulation Authority (PRA) has, this month, written to insurance companies in the UK to find out more about how they deal with the threat posed by cyber attacks and what mechanisms they have in place to...more

The Social Engineering Cyber Exposure [Video]

From the 2015 PLUS Professional Risk Symposium session “Bitcoins, Phishing…When is Cyber Crime ‘Just’ a Crime?” Scott L. Schmookler, Esq. (Gordon & Rees) and Steven Balmer (Travelers Bond & Specialty Insurance) discuss the...more

Court Grants Restraining Order in Light of Inadvertent Disclosure (California)

Newark Unified Sch. Dist. v. Superior Court , 2015 WL 4594095 (Cal. Ct. App. July 31, 2015). In this inadvertent document release case, the plaintiff sought injunctive relief against the defendant, requiring the return...more

IRS Admits Security Breach More Extensive

Earlier this year, the IRS announced that identity thieves had been able to hack one of its computer databases and gain access to extremely sensitive data.  Back then, the IRS indicated that about 225,000 households had been...more

FDA Issues Unprecedented Alert Over Medical Device Cyber Security Risk

A fictional cyber-terrorist weaponizing a medical device by hacking into it has become a familiar plot premise in recent Hollywood dramas.  Unfortunately, the risk of harm from medical device hacking has now become an...more

FRE 502(d) – An Underutilized “Safety Net” in Document Intensive Litigation

The inadvertent disclosure of privileged material may haunt a company for years, particularly in today’s era of pattern litigation and increased collaboration within the plaintiffs’ bar. Fortunately, in matters pending in...more

The key to information governance success lies within the framework

There is no secret sauce to achieving information governance nirvana. The reality is someone must take ownership of an organization’s information governance program. The industry as a whole has been discussing organizations...more

What Every Company’s Board Must Know About Cybersecurity

In recent years, data breaches at some of the world’s largest corporations have made news. But smaller companies are just as vulnerable, and must take steps to protect their data. In addition, businesses that serve as vendors...more

Developing or Enhancing “Bring Your Own Device” Programs – Your First Five Questions . . .

This is the second blog post in Discovery Advocate’s new series, “Your First Five Questions,” in which we identify a question commonly (or sometimes not so commonly) seen in practice followed by the first five questions you...more

OIG confirms Clinton sent classified emails through private account

The Office of the Inspector General for the State Department recently confirmed in a Memo that former Secretary of State Hillary Clinton sent emails with classified information in them through her private email account...more

Comptroller Talks Interest Rate, Compliance, and Cybersecurity Risks Facing Financial Institutions

On July 24, OCC Comptroller Curry delivered remarks before the New England Council in Boston, MA regarding the risks that financial institutions face today. Rising interest rates and regulatory compliance were two of the...more

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

NIST releases draft guide for use of mobile devices for medical providers

The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more

250 Results
View per page
Page: of 10

Follow Electronic Discovery Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.