Science, Computers & Technology General Business Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

Assuring Regulatory Compliance Doesn’t Get Lost in Translation

With the expansion of large multinational corporations into developing countries such as Russia, Brazil, India, Mexico and China, a proliferation of global regulatory enforcement actions, including anti-bribery and...more

Streaming At The Edge Of The Law

One of this year’s themes at the South by Southwest (SxSW) festival is “Surviving the Shift: Rethinking Music and Data.” The music industry is transforming itself as the trend in buying music shifts from digital download to...more

Business information and data processing: tidbits on the draft Code of Conduct

On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more

Taking a Forward-Looking Approach to Enterprise Risk Management

Traditionally, organizations have taken a backward-looking approach to risk, evaluating potential hazards on a siloed, departmental basis after a loss of assets. Organizations often take few proactive steps to detect risks,...more

2014 Information Governance Year in Review

2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more

Don’t Be the Next Data Breach Target

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

Data Center Contracts: Privacy and Security Terms

A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more

5 Questions You Should Ask about Big Data Security and Ediscovery

In the era of big data, vetting and asking the right security questions can help your organization save money and have peace of mind when it comes to ediscovery. Below is a general overview of some of the most important...more

How EU data protection laws impact cross-border FCPA investigations

EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more

Are you—or someone you love—a content hoarder?

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Fitting a Solution to Meet the Needs of a Workflow In-House

Your law firm just purchased a license for e-discovery software. Now what? Software implementations can be a substantial challenge for a variety of reasons, including lack of executive buy-in, poorly defined requirements,...more

Cloud Computing Is a Hot Topic… in Business and the Courtroom

Cloud computing sales are poised to triple by 2017, according to IHS Technology. With growth comes competition and the potential for disputes, both intellectual property-related and otherwise. This article surveys some of the...more

Avoiding the Digital Dark Age and Remaining Competitive

In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more

Avoiding Litigation: What Every Growing Company Should Know Now — Before It Is Too Late

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

Are You Facing the Prospect of a Merger Investigation?

If your organization is facing the prospect of a merger investigation and your lawyers haven’t raised the prospect of technology-assisted document review (“TAR”), then maybe you should be talking with someone...more

Obtaining German Works Council Approval to Collect Employee E-Mail and Electronic Documents Using EnCase® Enterprise and EnCase®...

German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more

Top EDiscovery Case Summaries - October 2013: New York: Court Allows Presumption of Prejudice, Overturns Previous Order Denying...

Sekisui Am. Corp. v. Hart, 2013 WL 4116322 (S.D.N.Y. Aug. 15, 2013). In this case, Judge Shira Scheindlin reversed an earlier order that denied spoliation sanctions for the plaintiffs’ deletion of ESI. The underlying breach...more

Top EDiscovery Case Summaries - October 2013: California: Court Orders Sanctions, Threatens Order to Retain an Ediscovery Vendor...

Logtale Ltd.v. IKOR, Inc., 2013 WL 3967750 (N.D. Cal. July 31, 2013). In this misrepresentation case, the plaintiffs sought to compel the defendants to comply with a prior court order and compel production from a defendant...more

BYOD: Party Essentials for Corporations and Employees

The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more

Law Firms And Cloud Computing

The term “cloud computing” has been tossed about as the new trend in IT. Unfortunately, just as often has you hear the term echoed as the “next big thing” a comprehensible definition rarely follows. So what is cloud...more

California Electronic Discovery Act: Part Three

Part Three in a multi-part series on the topic. In Part One of this series, we discussed California’s Electronic Discovery Act. Part Two discussed the importance in legal proceedings of electronic information from social...more

#Ediscovery & Biz Data Keeps you from Sleeping? Know Data Retention Policy's 4 Pillars. Primer.

Writing a Data Retention Policy may seem unimportant when there are so many other aspects of running a business that require your attention, but having one in place will save your company lot of time, money, and headache if...more

Five Tips for Hiring E-Discovery Vendors; Do your homework to ensure you get the right vendor with the right tools at the right...

Originally published on i-Sight.com's blog: “5 Tips for Hiring an E-Discovery Vendor in a Workplace Investigation” It can be difficult to decide whether to retain an e-discovery vendor if a company is unaware of what the...more

Getting the Deal Through – e-Commerce 2013

"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor: Robert Bond of Speechly Bircham LLP)....more

35 Results
|
View per page
Page: of 2

Follow Science, Computers & Technology Updates on:

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×