News & Analysis as of

Science, Computers & Technology General Business Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:

Internet of Things (IoT) Poses Information Governance Challenges for Organizations - Nextra Solutions

by Nexsen Pruet, PLLC on

The Internet of Things (“IoT”) seems to impact every aspect of life. IoT generally refers to computing devices embedded in everyday objects that collect data. From thermostats to driver-assisted cars, innumerable devices...more

Data Security Law: Managing The Legal Risks Of Cloud And Collaboration Tools

by Ellis & Winters LLP on

As anyone with a Dropbox or Google Drive account knows, consumer-grade cloud storage and collaboration services are a convenient way to store and share personal photos, music, video and documents. Employees who use these...more

Key Considerations for Adopting Ephemeral Communications Tools

by Mintz Levin - Mintz Edge on

The combination of emerging technologies, information security risks and electronic discovery obligations continues to give rise to questions regarding best practices for adoption of modern ephemeral communication tools in...more

Law Firm Sues Insurer Over $700K in Lost Billings Due to Ransomware Attack: eDiscovery Trends

by CloudNine on

A small Rhode Island law firm has filed a lawsuit against its insurance company after the insurer refused to pay $700,000 in lost billings following a ransomware attack on the firm that locked down the firm’s computer files...more

The Impact of Cybersecurity Concerns on M&A Activities is Growing: eDiscovery Trends

by CloudNine on

This is the second story that I’ve covered in the past several months where cybersecurity concerns impacted merger and acquisitions. See below for more on the first one… After Verizon Communications took a $350...more

Now, We Have a Privacy Shield with the Swiss Too: eDiscovery Trends

by CloudNine on

This appears to be our week to cover privacy stories on the blog. First, The Sedona Conference® (TSC) released the public comment version of its new Data Privacy Primer (which we covered on Tuesday). Also, last week, U.S....more

Three Tips to Verify the Security of Your E-Discovery Software

by Zapproved LLC on

SOC 2® Type 2 Certification and Zapproved–Building Trust and Confidence that Your Data is Secure - Today in e-discovery, it should be no surprise that cyber security is a rising concern among corporate leaders and that...more

The European, Middle Eastern and African Investigations Review 2016: United Kingdom: handling internal investigations

by WilmerHale on

With so much potentially at stake, the initial steps and strategic decisions taken in any company investigation are critical to setting the tone for a focused, credible and effective inquiry. This is paramount not only for...more

I am not a Crook: Avoiding the Politics of Data Preservation with a Defensible E-Discovery Process

by Exterro, Inc. on

Of course we've all heard about Hillary's emails, and Trump certainly has email trouble of his own. For a while, Politwoops kept track of mistweets and other online regrets even after they were deleted until Twitter (and...more

Benchmark surveys: GCs, Executives Not Prepared to Defend Against Cyberbreaches - Key Protective Steps

by DLA Piper on

Although cybersecurity has become a more prominent issue for executives and boards of directors, three recent benchmark surveys - the BDO Board Survey, the 2015 Consero Group’s General Counsel Data Survey, and the 2015 US...more

Expanding Cybersecurity Safeguarding Requirements, Reporting Obligations, and Cloud-Based Security: A Brief Guide to Understanding...

by McCarter & English, LLP on

The United States Department of Defense promulgated an “interim” rule, effective August 26, 2015, which placed imposing and costly burdens on all DoD contractors and subcontractors (including small businesses and commercial...more

Lessons Learned from Target’s Data Breach Discovery Win - Five Strategies for Maintaining Privilege in the Aftermath of a Data...

by Poyner Spruill LLP on

A thousand questions immediately flood any lawyer’s mind when they first hear that their client may have been affected by a data breach. How did it happen? What data were affected? Was there any personal information affected,...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

by Morgan Lewis on

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Client Alert: Sex, Money and Cybersecurity - Reminders for Public Companies

by GableGotwals on

Recent events have highlighted the importance of comprehensive cyber-security programs for publicly-traded companies. Although the circumstances differ, in each case the impact of employee behavior with electronic...more

Pardon the “Intrusion” – Cybersecurity Worries Scuttle Wassenaar Changes

Companies concerned about their cybersecurity posture can breathe a small sigh of relief, as the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) recently announced it was scrapping plans to implement new...more

New survey shows continued lack of executive confidence in cybersecurity and increases in data loss

A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

Business information and data processing: tidbits on the draft Code of Conduct

by DLA Piper on

On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more

2014 Information Governance Year in Review

by BakerHostetler on

2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more

Data Center Contracts: Privacy and Security Terms

by Snell & Wilmer on

A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more

How EU data protection laws impact cross-border FCPA investigations

by DLA Piper on

EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more

Are you—or someone you love—a content hoarder?

by BakerHostetler on

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Cloud Computing Is a Hot Topic… in Business and the Courtroom

Cloud computing sales are poised to triple by 2017, according to IHS Technology. With growth comes competition and the potential for disputes, both intellectual property-related and otherwise. This article surveys some of the...more

Avoiding the Digital Dark Age and Remaining Competitive

by Zelle LLP on

In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more

Avoiding Litigation: What Every Growing Company Should Know Now — Before It Is Too Late

by Robins Kaplan LLP on

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

41 Results
|
View per page
Page: of 2
Cybersecurity

Follow Science, Computers & Technology Updates on:

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.