Science, Computers & Technology Electronic Discovery Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

EDRM Releases A New Model For Analyzing Private Data

Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more

Dear Mr. Snowden: Is it reasonable to expect my attorney-client communications are confidential?

Last month, Edward Snowden provided the press a document describing “how Australian intelligence conducted surveillance of trade talks between Indonesia and the United States and, in the process, monitored communications...more

Isn’t E-Discovery Hard Enough Without the Internet of Things?

This week, after a seemingly endless year of construction, my family and I moved into our new, energy-efficient home. As I was in the kitchen unpacking, my daughter cried out, somewhat dramatically, “Mama, come here…. The...more

Privacy: What the World Has to Say About It

Let’s face it: technology has made the world smaller. It’s no longer extraordinary for what was once termed a “mid-sized” or “regional” company to trade and outsource in foreign markets. Indeed, the Internet has made it...more

BYOD: Policy Considerations for Employers in the Age of Personal Devices

Employees who use personal smart phones, PDAs, tablets, laptops and other electronic devices to connect to the employer’s computer network are fast becoming more of a rule than an exception. Today’s employees are often...more

Week in Review - January 16, 2014

This week's headlines charged employers with preserving and protecting data in the workplace. This advice is timely given that this week is “Tax Identity Theft Awareness Week,” a time when employers are reminded to safeguard...more

Something Wicked This Way Comes - Dark and Dusty Data and the Risk Your Organization Already Owns

During the final panel of Thomson Reuters’ 17th Annual eDiscovery & Information Governance in Practice Forum, Thomas Barnett, Ignatius Grande, and Sandra Rampersaud led a lively discussion on Managing Big Data, Dark Data, and...more

Audit Log Discovery As A Feature Of The Electronic Medical Record

The increased use of electronic medical records ("EMR") is changing not only the way physicians practice medicine but also the way discovery is conducted in medical malpractice lawsuits. Plaintiffs' attorneys seek to...more

Obtaining German Works Council Approval to Collect Employee E-Mail and Electronic Documents Using EnCase® Enterprise and EnCase®...

German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more

BYOD: Party Essentials for Corporations and Employees

The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more

Risky Business: "Bring-Your-Own-Device" And Your Company

Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more

Jason Maloni on Data Security [Video]

In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more

Top 5 Ediscovery Case Summaries – August 2013: Ohio - Stored Communications Act Can Block Employer Access to Personal Data on...

Lazette v. Kulmatycki, 2013 WL 2455937 (N.D. Ohio June 5, 2013). In this employment law case, the federal district court held that the Stored Communications Act (SCA) can apply if an employer reads personal emails from...more

A Hurdle To Obtaining Electronic Evidence

While many cases focus on electronic evidence available on employee laptops and behind corporate firewalls, massive volumes of electronic evidence can be found on the servers of companies that provide electronic processing...more

Practical Tips for APAC Ediscovery

In our ever-shrinking, interconnected world, it is imperative that legal practitioners establish expertise in international ediscovery law. One of the most dramatic evolutions in ediscovery is occurring in the Asia-Pacific...more

Safeguards against Data Security Breaches (Part Two) [Video]

?Are you looking to guard your company's “secret sauce?” Fenwick’s Robert Brownstone says companies should safeguard their data by limiting the number of employees with access to certain confidential information. Following up...more

Court Quotes Mark Zuckerberg’s Opinion Of Where Privacy Is Going On The Web

Since this blog’s inception we have frequently posted about the discovery of social media content; however, it is rare, indeed, when a decision we review cites to the opinion of a social media website’s chief executive...more

Data Management for Health Care Organizations: Is Your Head in the Sand? The Data Is Not There

It is virtually inevitable that health care companies will be called upon to preserve, collect, review and produce some portion of their electronic records. Health care companies face unique and complex challenges as they...more

Top 3 Concerns in Data Security [Video]

In the video, Robert Brownstone, co-chair of Fenwick’s Electronic Information Management Group, describes how the world of data security impacts every organization regardless of size. He identifies three main areas of...more

What Does A Child Pornography Case Tell You About Computer Evidence?

What Does a Child Pornography Case Tell You About Computer Evidence? was published in the November 2012 Palm Beach Bar Bulletin and discusses the recent United States v. Seiver case as well as the simple steps for lawyers,...more

EEOC Plaintiff Must Disclose Passwords to Former Employer

A Colorado federal judge ordered that a person suing her former employer must provide all of her cell phone messages, social media passwords, and passwords to access any of her email accounts or blogs for the judge’s in...more

#Ediscovery & Biz Data Keeps you from Sleeping? Know Data Retention Policy's 4 Pillars. Primer.

Writing a Data Retention Policy may seem unimportant when there are so many other aspects of running a business that require your attention, but having one in place will save your company lot of time, money, and headache if...more

Cybersecurity and Data Privacy: Big Data and the Law [Video]

As the use of the internet and social media continues to increase rapidly, companies are being challenged to keep up with changing laws and the many ways in which customer and employee data flow in and out of their hands. In...more

Lawyers in the Cloud

"Lawyers in the Cloud" explains the cloud storage system, risks, and how to assess whether to use large private systems or public systems like DropBox. From the July/August 2012 Palm Beach Bar Bulletin....more

Cybercrimes and the Workplace

This article discusses that, in addition to civil liability that employment lawyers tend to be alert for in departing employee scenarios, departing employees can also be criminally liable for theft, misappropriation, or other...more

52 Results
|
View per page
Page: of 3

Follow Science, Computers & Technology Updates on: