Science, Computers & Technology Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Finding the Smoking Gun: 4 Search Tips for Quickly Finding Relevant Documents

In a recent survey conducted by Exterro, 39% (the largest group of respondents) said that searching through large amounts of data was the biggest obstacle they face in locating responsive data. To help legal professionals...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Back to School: A Primer on Cross-Border Discovery Issues

In September, the Sedona Conference released its latest publication on e-discovery matters, Practical In-House Approaches for Cross-Border Discovery & Data Protection, for public comment. The publication addresses a number of...more

5 Tips for Quickly Identifying Responsive Data Sources for E-Discovery Collections

Working with IT or your service provider to collect/process from a variety of data sources, like email archives, file shares, legacy backup tapes, SharePoint, etc., can be a painful and complicated ordeal. You don’t...more

Two Reasons Why You Should Take Your Lit Support Manager to Lunch!

When we think about the people who are involved in the task of identifying, assessing, collecting, reviewing and producing data (we’ll call this “data management”), there’s someone from Legal, someone from IT who has an...more

Client Alert: Sex, Money and Cybersecurity - Reminders for Public Companies

Recent events have highlighted the importance of comprehensive cyber-security programs for publicly-traded companies. Although the circumstances differ, in each case the impact of employee behavior with electronic...more

Pardon the “Intrusion” – Cybersecurity Worries Scuttle Wassenaar Changes

Companies concerned about their cybersecurity posture can breathe a small sigh of relief, as the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) recently announced it was scrapping plans to implement new...more

New survey shows continued lack of executive confidence in cybersecurity and increases in data loss

A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more

Five Drivers of E-Discovery in the APAC Region

In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more

Target and Visa reach $67M settlement

Visa, Inc. announced on August 18th that it has reached a settlement with Target for $67 million to reimburse Visa for costs associated with the Target data breach in late 2013, including issuing millions of new cards to...more

Hacking Your Health: For Healthcare Providers, Risk Analysis Must Be Ongoing

Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more

UK Insurers Probed for Cyber Risk

The UK's Prudential Regulation Authority (PRA) has, this month, written to insurance companies in the UK to find out more about how they deal with the threat posed by cyber attacks and what mechanisms they have in place to...more

The Social Engineering Cyber Exposure [Video]

From the 2015 PLUS Professional Risk Symposium session “Bitcoins, Phishing…When is Cyber Crime ‘Just’ a Crime?” Scott L. Schmookler, Esq. (Gordon & Rees) and Steven Balmer (Travelers Bond & Specialty Insurance) discuss the...more

IRS Admits Security Breach More Extensive

Earlier this year, the IRS announced that identity thieves had been able to hack one of its computer databases and gain access to extremely sensitive data.  Back then, the IRS indicated that about 225,000 households had been...more

FDA Issues Unprecedented Alert Over Medical Device Cyber Security Risk

A fictional cyber-terrorist weaponizing a medical device by hacking into it has become a familiar plot premise in recent Hollywood dramas.  Unfortunately, the risk of harm from medical device hacking has now become an...more

The key to information governance success lies within the framework

There is no secret sauce to achieving information governance nirvana. The reality is someone must take ownership of an organization’s information governance program. The industry as a whole has been discussing organizations...more

Proposed class action case filed against Medical Informatics Engineering

Medical Informatics Engineering, Inc., an electronic medical record service provider, recently disclosed a data breach affecting approximately 4 million individuals. Within days of the disclosure, Medical Informatics was hit...more

What Every Company’s Board Must Know About Cybersecurity

In recent years, data breaches at some of the world’s largest corporations have made news. But smaller companies are just as vulnerable, and must take steps to protect their data. In addition, businesses that serve as vendors...more

Developing or Enhancing “Bring Your Own Device” Programs – Your First Five Questions . . .

This is the second blog post in Discovery Advocate’s new series, “Your First Five Questions,” in which we identify a question commonly (or sometimes not so commonly) seen in practice followed by the first five questions you...more

The Big Move Toward Big Data in Employment

The world of Big Data has arrived, and it is beginning to affect employers and their decision-making in ways undreamed of even a few years ago. Employers can access more information about their applicant pool than ever...more

OIG confirms Clinton sent classified emails through private account

The Office of the Inspector General for the State Department recently confirmed in a Memo that former Secretary of State Hillary Clinton sent emails with classified information in them through her private email account...more

Comptroller Talks Interest Rate, Compliance, and Cybersecurity Risks Facing Financial Institutions

On July 24, OCC Comptroller Curry delivered remarks before the New England Council in Boston, MA regarding the risks that financial institutions face today. Rising interest rates and regulatory compliance were two of the...more

NIST releases draft guide for use of mobile devices for medical providers

The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

FFIEC Releases Cybersecurity Assessment Tool

Why it matters - As anticipated, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool, providing a process for financial institutions' management to gauge their...more

409 Results
View per page
Page: of 17

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.