Science, Computers & Technology Electronic Discovery Privacy

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

2014 Information Governance Year in Review

2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many...more

Don’t Be the Next Data Breach Target

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

Bring Your Own Challenges

From reliable surveys and less dependable anecdotes in most major markets, including the UK and the US, opinions point to the almost inevitable expansion of BYOD – Bring Your Own Device – as a cost-saving model for employers....more

Data Center Contracts: Privacy and Security Terms

A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more

Alert: New Russian Law Will Require Personal Data of Russian Citizens to be Processed on Servers Located in Russia

In July 2014, Russian Federation President Vladimir Putin signed Federal Law No. 242-FZ (the "Law"), which amends existing Russian data privacy laws to require that personal data of Russian citizens be processed by servers...more

5 Questions You Should Ask about Big Data Security and Ediscovery

In the era of big data, vetting and asking the right security questions can help your organization save money and have peace of mind when it comes to ediscovery. Below is a general overview of some of the most important...more

Top 10 Technology Blunders for Employers

As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more

Cybersecurity Litigation Monthly Newsletter

As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more

Data Privacy: The Next Frontier of Corporate Compliance [Video]

Companies are collecting more and more personal data. With that collection is an increased responsibility and the potential for more government regulation. Attorneys Rick Martinez and Seth Northrop discuss the changes that...more

National Highway Traffic Safety Administration Considers Privacy Implications for New Vehicle-to-Vehicle Technology

The Department of Transportation’s National Highway Traffic Safety Administration (“NHTSA”) announced in 2014 that it would begin steps toward implementing vehicle-to-vehicle (“V2V”) technology with an aim toward decreasing...more

Delaware Data Destruction Law Highlights the Necessity of Data Destruction Plans

The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more

How EU data protection laws impact cross-border FCPA investigations

EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more

Feds Pose Privacy Risk by Grabbing Overseas ISP E-mails

Microsoft Corp. is appealing the recent decision of U.S. District Judge Loretta A. Preska which requires the company to disclose the contents of e-mails stored at a data center in Dublin, Ireland, in compliance with a warrant...more

The Uber Playbook: 5 Best Practices for Protecting Data Privacy

The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more

Wearable Technology: A Perfect Fit For Litigation

It should come as no surprise that wearable technology and fitness trackers, such as Google Glass, the Jawbone UP, and the Narrative Clip are saturating the consumer market, and as a result, consumers are increasingly...more

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

What’s in Your Wallet? Who Cares—What’s in Your Cell Phone Is More Important!

The United States Supreme Court has tackled the issue of cell phone privacy and ruled that data is different from other forms of technology. In late June, the Supreme Court issued an opinion: those of David Riley, a...more

Facebook: What Exactly are We Sharing When We Update Our Statuses?

Facebook’s newest feature may have you thinking twice about your status updates. However it’s not what you write that you should worry about, but rather where you write it. The social media giant has unveiled the latest...more

Massachusetts High Court Permits Compelled Decryption of Seized Digital Evidence

Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more

Avoiding the Digital Dark Age and Remaining Competitive

In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more

Avoiding Litigation: What Every Growing Company Should Know Now — Before It Is Too Late

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

Heartbleed Won’t Bring Cardiac Arrest for Ediscovery

How do you stop a security professional’s heart from beating? Two words: security breach. In today’s “Internet of Everything” environment, the impact of a security breach can be felt around the world and back again…in...more

Cybersecurity Is Not Just an IT Issue; It’s an IG Issue

For leaders and counsel in many organizations, the word “cybersecurity” typically triggers concerns about the IT department, conjuring images of hackers and requiring unfamiliar terminology such as “firewalls” and...more

EDRM Releases A New Model For Analyzing Private Data

Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more

Dear Mr. Snowden: Is it reasonable to expect my attorney-client communications are confidential?

Last month, Edward Snowden provided the press a document describing “how Australian intelligence conducted surveillance of trade talks between Indonesia and the United States and, in the process, monitored communications...more

74 Results
|
View per page
Page: of 3

Follow Science, Computers & Technology Updates on: