Science, Computers & Technology Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

A Veritable Feast: E-Discovery Tools and Resources for the Holiday Season

Thanksgiving is a time of reflection, for looking back on the challenges of the previous year and recognizing all those who supported us through them. It’s also a time of preparedness. Yes, most people see Thanksgiving as the...more

Expect New Cybersecurity Regs from New York DFS

DFS identified several areas that would be the subject of specific requirements in the potential regulations. These include requirements for (i) cyber security policies and procedures, (ii) third-party service provider...more

FFIEC Releases Revised Management Booklet with Emphasis on Sound IT Governance

On November 10, the FFIEC issued a revised Management booklet, which outlines the principles of overall sound governance and, more specifically, IT governance. The booklet is one of 11 that makes up the FFIEC’s Information...more

High Noon at the Train Station: Social Media and Modern E-Discovery

Most people take time zones for granted these days, but it was this week in 1883 that railroad companies in both Canada and the United States started using four continental time zones. Until then, time was local, based on...more

The LabMD Case: Further Defining the FTC’s Enforcement Powers

The scaffolding of the FTC’s powers in the realm of cybersecurity continues to be built. On Monday, the FTC’s Chief Administrative Law Judge D. Michael Chappell issued an initial decision in the FTC’s closely watched...more

NAIC Cybersecurity Bill of Rights: The Awkward New Guest at the Data Breach Law Party

On October 14, 2015, the NAIC’s Cybersecurity (EX) Task Force adopted a Cybersecurity Bill of Rights, an aspirational, well-intended document outlining the rights insurance consumers should (or could? or might? this point...more

Benchmark surveys: GCs, Executives Not Prepared to Defend Against Cyberbreaches - Key Protective Steps

Although cybersecurity has become a more prominent issue for executives and boards of directors, three recent benchmark surveys - the BDO Board Survey, the 2015 Consero Group’s General Counsel Data Survey, and the 2015 US...more

California Updates Privacy Rights with the Electronic Communications Privacy Act

Starting on New Years Day 2016, a new law will prohibit California law enforcement agencies from compelling California residents and businesses to turn over metadata or electronic communications (e.g., texts, emails,...more

The Land of the Rising Sun—and Rising Data Protection Requirements

Between January 2016 and September 2017, a series of amendments to Japan’s Act on the Protection of Personal Information (APPI) will go into effect. The amendments, which were promulgated in September 2015, are the first...more

2015 Amendments to the Federal Rules of Civil Procedure Provide Opportunities for More Aggressive Case Management

On December 1, 2015, substantial changes to the Federal Rules of Civil Procedure (FRCP or Rules) will take effect. The Rule changes affect many aspects of federal court practice, most significantly with respect to the scope...more

White House Issues Cybersecurity Strategy And Implementation Plan Following Cybersecurity Sprint

On October 30, the White House released a memorandum to the heads of federal departments and agencies detailing the Cybersecurity Strategy and Implementation Plan (“CSIP”), a proposal designed to update and bolster federal...more

Privacy Law, Cross-Border Data Flows, and the Trans-Pacific Partnership Agreement: What Counsel Need to Know

Privacy law has become such a hot-button issue that it now finds its way into multilateral trade treaties like the Trans-Pacific Partnership Agreement (TPP or Agreement). On November 5, 2015, the U.S. Trade Representative...more

FCC Issues First Privacy Enforcement Action Against Cable Operator

In the third privacy-related enforcement action of the year, the FCC Enforcement Bureau entered into a $595,000 settlement with Cox Communications to resolve an investigation into the company’s loss of customer personal data....more

Expanding Cybersecurity Safeguarding Requirements, Reporting Obligations, and Cloud-Based Security: A Brief Guide to Understanding...

The United States Department of Defense promulgated an “interim” rule, effective August 26, 2015, which placed imposing and costly burdens on all DoD contractors and subcontractors (including small businesses and commercial...more

BYOD = BYOA (Aspirin)

In a side-by-side comparison between the benefits and detriments of BYOD (Bring Your Own Device), there’s no doubt that allowing BYOD might seem likely to yield productivity gains and other benefits for the company. But from...more

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

It’s Called Sputnik!: Don’t Fall Behind in the E-Discovery Space Race

This week marks the 58th anniversary since the launch of Sputnik II, the first spacecraft in history to carry a living animal—a dog named Laika—into Earth orbit. But the Sputnik program, which began the space age in 1957,...more

Senate Passes Legislation To Ease Sharing Of Cybersecurity Threat Information

On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more

NAIC Adopts Cybersecurity Bill of Rights

The National Association of Insurance Commissioners (“NAIC”) continued its efforts to advance cybersecurity in the insurance industry when it recently adopted the Cybersecurity Bill of Rights. The Cybersecurity Bill of Rights...more

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

For the first Tuesday in November, we have 10 easy steps to make sure that your data breach incident response planning is viewed from that pesky point of view of a litigator....more

Truth or Consequences: Does the Senate’s Information Sharing Bill Really Help Business?

Reacting to the influx of recent, high-profile data breaches and cybersecurity attacks in the government and the private sector, the U.S. Senate earlier this week passed the controversial Cybersecurity Information Security...more

California Updates Data Security Laws

Why it matters - The first state to enact data breach notification legislation, California has now updated Civil Code Section 1798.82 with three new bills signed into law by Governor Jerry Brown. Specifically, Senate...more

NIST seeks comments on Privacy-Enhanced Identity Brokers project document

The National Cybersecurity Center of Excellence, in partnership with the National Strategy for Trusted Identities in Cyberspace National Program Office, have launched a project designed to embed privacy and security measures...more

Consumer Trust should be at the heart of the Digital Economy

A recent report summary produced by the Organisation for Economic Cooperation and Development (‘OECD’) highlighted that many countries are placing too much emphasis on developing their digital economies and are neglecting the...more

Blog: Implications of the Cybersecurity Bill for the Health Care Industry

On Tuesday the Senate passed the Cybersecurity Information Sharing Act (CISA). The House had passed a similar bill, the Protecting Cyber Networks Act, in April of this year. The Act comes in the wake of many large scale data...more

440 Results
View per page
Page: of 18

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.