Science, Computers & Technology Business Organization Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

A Veritable Feast: E-Discovery Tools and Resources for the Holiday Season

Thanksgiving is a time of reflection, for looking back on the challenges of the previous year and recognizing all those who supported us through them. It’s also a time of preparedness. Yes, most people see Thanksgiving as the...more

Benchmark surveys: GCs, Executives Not Prepared to Defend Against Cyberbreaches - Key Protective Steps

Although cybersecurity has become a more prominent issue for executives and boards of directors, three recent benchmark surveys - the BDO Board Survey, the 2015 Consero Group’s General Counsel Data Survey, and the 2015 US...more

It’s Called Sputnik!: Don’t Fall Behind in the E-Discovery Space Race

This week marks the 58th anniversary since the launch of Sputnik II, the first spacecraft in history to carry a living animal—a dog named Laika—into Earth orbit. But the Sputnik program, which began the space age in 1957,...more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

Board Participation in Cybersecurity: What More Needs to Be Done?

High-profile data breaches seem to hit the headlines almost every day. These breaches have proved terrifying for many companies, particularly as the attackers release embarrassing emails and other information. The frequency...more

Finding the Smoking Gun: 4 Search Tips for Quickly Finding Relevant Documents

In a recent survey conducted by Exterro, 39% (the largest group of respondents) said that searching through large amounts of data was the biggest obstacle they face in locating responsive data. To help legal professionals...more

5 Tips for Quickly Identifying Responsive Data Sources for E-Discovery Collections

Working with IT or your service provider to collect/process from a variety of data sources, like email archives, file shares, legacy backup tapes, SharePoint, etc., can be a painful and complicated ordeal. You don’t...more

Two Reasons Why You Should Take Your Lit Support Manager to Lunch!

When we think about the people who are involved in the task of identifying, assessing, collecting, reviewing and producing data (we’ll call this “data management”), there’s someone from Legal, someone from IT who has an...more

The Social Engineering Cyber Exposure [Video]

From the 2015 PLUS Professional Risk Symposium session “Bitcoins, Phishing…When is Cyber Crime ‘Just’ a Crime?” Scott L. Schmookler, Esq. (Gordon & Rees) and Steven Balmer (Travelers Bond & Specialty Insurance) discuss the...more

Information Governance: Points from the Professionals

Information governance (IG) is becoming more and more critical to any organization’s success in controlling the sheer mass of data generated in the ordinary course of business. However, determining the best ways to get...more

Information Governance and the Converging Roles of the GC & CIO

Even more than e-discovery, information governance (IG) requires a systematic and strategic relationship between a company's IT and legal departments. This collaboration starts from the top, with the CIO and GC serving as two...more

No Captain at the Helm: Information Governance’s Leadership Problem

Effective information governance is about taking information — your most important business asset — and looking at ways to better leverage it in a manner that streamlines the business processes, and reduces costs and risk....more

Data Privacy: The Next Frontier of Corporate Compliance [Video]

Companies are collecting more and more personal data. With that collection is an increased responsibility and the potential for more government regulation. Attorneys Rick Martinez and Seth Northrop discuss the changes that...more

Delaware Data Destruction Law Highlights the Necessity of Data Destruction Plans

The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more

The Uber Playbook: 5 Best Practices for Protecting Data Privacy

The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more

Two Tips for Inventors Filing Patent Applications [Video]

The intense patent activity in graphene stems from its enormous technological and commercial potential. But because much of the territory underlying the graphene cross-roads has already been claimed, patenting graphene poses...more

Safeguards against Data Security Breaches (Part Two) [Video]

?Are you looking to guard your company's “secret sauce?” Fenwick’s Robert Brownstone says companies should safeguard their data by limiting the number of employees with access to certain confidential information. Following up...more

Top 3 Concerns in Data Security [Video]

In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more

Getting the Deal Through – e-Commerce 2013

"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor: Robert Bond of Speechly Bircham LLP)....more

Cybersecurity and Data Privacy: Big Data and the Law [Video]

As the use of the internet and social media continues to increase rapidly, companies are being challenged to keep up with changing laws and the many ways in which customer and employee data flow in and out of their hands. In...more

T.R. Investors v. Genger

Brief of Amicus Curiae in Support of Defendant Below-Appellant Urging Reversal

This amicus brief addresses issues raised in the Court of Chancery relating to preservation and deletion of data. In the brief, amici argue that the Court misapplied technological concepts and therefore reached a conclusion...more

Social Media Governance: Applied Discovery and Sensei Enterprises put it all in perspective

25 June 2010 — Social Media Governance. A new term creeps across the e-discovery and compliance landscape, seeking to join the pantheon of other irritating phrases like "governance, risk and compliance", "legal project...more

cyber attacks on corporates

cyber attacks on corporates have become common either by competitors or state sponsored actors of foriegn state, Security to organisations and legal compliance has become important...more

Technology Trends in the Legal Community: Software as a Service (SaaS)

This paper provides an overview of the recently emerging Software as a Service (SaaS) alternatives and explains how they can address the technical and business challenges surrounding electronic data management in...more

California E-Discovery: Marquis of Queensbury Rules Shall Apply

"A 'smackdown' event on January 7, 2008 resulted in a 'right hook to the chin' of the plaintiff?s attorneys in Qualcomm, Inc. v. Broadcom Corp.1 In a San Diego California federal courtroom, the attorneys felt the pain of an...more

25 Results
View per page
Page: of 1

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.