Science, Computers & Technology Electronic Discovery Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Back to School: A Primer on Cross-Border Discovery Issues

In September, the Sedona Conference released its latest publication on e-discovery matters, Practical In-House Approaches for Cross-Border Discovery & Data Protection, for public comment. The publication addresses a number of...more

Client Alert: Sex, Money and Cybersecurity - Reminders for Public Companies

Recent events have highlighted the importance of comprehensive cyber-security programs for publicly-traded companies. Although the circumstances differ, in each case the impact of employee behavior with electronic...more

Pardon the “Intrusion” – Cybersecurity Worries Scuttle Wassenaar Changes

Companies concerned about their cybersecurity posture can breathe a small sigh of relief, as the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) recently announced it was scrapping plans to implement new...more

New survey shows continued lack of executive confidence in cybersecurity and increases in data loss

A new survey released by Raytheon and websense, called “Study-Why Executives Lack Security Posture Confidence While Knowing that the Metrics They Use to Gauge it are Ineffective” “reveals that confidence in [executives’]...more

Five Drivers of E-Discovery in the APAC Region

In last week’s blog, we discussed developing trends in e-discovery law in the Asia-Pacific region. This week, we explore five trends that will continue to spur the growth of e-discovery in this region over the next few years....more

Target and Visa reach $67M settlement

Visa, Inc. announced on August 18th that it has reached a settlement with Target for $67 million to reimburse Visa for costs associated with the Target data breach in late 2013, including issuing millions of new cards to...more

Hacking Your Health: For Healthcare Providers, Risk Analysis Must Be Ongoing

Healthcare providers would be wise to keep in mind that if a patient is harmed by a hacked medical device, Exhibit A in the negligence suit against them may be that provider’s risk analysis, or lack thereof....more

UK Insurers Probed for Cyber Risk

The UK's Prudential Regulation Authority (PRA) has, this month, written to insurance companies in the UK to find out more about how they deal with the threat posed by cyber attacks and what mechanisms they have in place to...more

The Social Engineering Cyber Exposure [Video]

From the 2015 PLUS Professional Risk Symposium session “Bitcoins, Phishing…When is Cyber Crime ‘Just’ a Crime?” Scott L. Schmookler, Esq. (Gordon & Rees) and Steven Balmer (Travelers Bond & Specialty Insurance) discuss the...more

IRS Admits Security Breach More Extensive

Earlier this year, the IRS announced that identity thieves had been able to hack one of its computer databases and gain access to extremely sensitive data.  Back then, the IRS indicated that about 225,000 households had been...more

FDA Issues Unprecedented Alert Over Medical Device Cyber Security Risk

A fictional cyber-terrorist weaponizing a medical device by hacking into it has become a familiar plot premise in recent Hollywood dramas.  Unfortunately, the risk of harm from medical device hacking has now become an...more

The key to information governance success lies within the framework

There is no secret sauce to achieving information governance nirvana. The reality is someone must take ownership of an organization’s information governance program. The industry as a whole has been discussing organizations...more

What Every Company’s Board Must Know About Cybersecurity

In recent years, data breaches at some of the world’s largest corporations have made news. But smaller companies are just as vulnerable, and must take steps to protect their data. In addition, businesses that serve as vendors...more

Developing or Enhancing “Bring Your Own Device” Programs – Your First Five Questions . . .

This is the second blog post in Discovery Advocate’s new series, “Your First Five Questions,” in which we identify a question commonly (or sometimes not so commonly) seen in practice followed by the first five questions you...more

OIG confirms Clinton sent classified emails through private account

The Office of the Inspector General for the State Department recently confirmed in a Memo that former Secretary of State Hillary Clinton sent emails with classified information in them through her private email account...more

Comptroller Talks Interest Rate, Compliance, and Cybersecurity Risks Facing Financial Institutions

On July 24, OCC Comptroller Curry delivered remarks before the New England Council in Boston, MA regarding the risks that financial institutions face today. Rising interest rates and regulatory compliance were two of the...more

NIST releases draft guide for use of mobile devices for medical providers

The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

FFIEC Releases Cybersecurity Assessment Tool

Why it matters - As anticipated, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool, providing a process for financial institutions' management to gauge their...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

PII in your ESI: The Intersection of Data Privacy and E-Discovery

There is a significant nexus between data privacy and security and e-discovery that grows more pronounced as the volume of data generated multiplies exponentially and the ability of e-discovery tools to collect and process...more

The WSGR Data Advisor

In this issue: - Navigating Public Company Cybersecurity Obligations: Advising Boards and Disclosing to Investors - FTC Updates School-Related COPPA Guidance - Status Update on the EU Data Protection...more

FFIEC Cybersecurity Assessment Tool: Not Just For Financial Institutions

On June 30, 2015, the Federal Financial Institutions Examination Council (FFIEC) released its long anticipated Cybersecurity Assessment Tool (press release here). The FFIEC is a formal interagency organization empowered to...more

Connecticut Imposes New Data Security Obligations

New law will require consumer breach notice within 90 days, identity theft protection for consumers,“kill switch” for smartphones, and implementation of data security programs for certain health providers, state agencies and...more

OPM data breach update: OPM shuts down background check system

The OPM announced this week that it is temporarily shutting down its background security clearance system, e-QIP, as vulnerabilities were found during a review of systems. Presently, according to OPM, the vulnerabilities did...more

120 Results
View per page
Page: of 5

Follow Science, Computers & Technology Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.