News & Analysis as of

Confidential Information Attorney-Client Privilege Today's Popular Updates

HaystackID

Navigating International Discovery Restrictions: Seven Recommendations

HaystackID on

Background Note: International discovery exercises and investigations can be a complex and challenging process for cybersecurity, information governance, and eDiscovery professionals. Navigating the different laws and...more

Hinshaw & Culbertson - Insights for Insurers

No Protection for Vendor's Forensic Report in Post-Breach Litigation? - Preserving Privilege and Work Product Protection in Light...

A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more

Womble Bond Dickinson

Federal Court Finds Cybersecurity Forensic Report Not Privileged Under Attorney Work Product Doctrine

Womble Bond Dickinson on

The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more

Nutter McClennen & Fish LLP

How to Structure Your Organization’s Cybersecurity Management

Q: Who in a company is vital for cybersecurity management? Seth Berman: Cybersecurity is everyone’s responsibility. The board and senior management must set the priorities and shape the culture, but even the lowest-level...more

Ruder Ware

Employee Use of Company E-mail May be Protected from Company View

Ruder Ware on

Companies have always taken the position that an employee’s use of company e-mail is not private, and can be accessed and reviewed by the company at any time. There have been a large number of court cases, which have held...more

Ward and Smith, P.A.

In-House Counsel: How to Avoid Missteps in the Social Media Minefield

Ward and Smith, P.A. on

While social media has become ubiquitous, attorneys are subject to particular restrictions online. During Ward and Smith’s 2017 In-House Counsel Seminar two attorneys reviewed some of the potential pitfalls in-house counsel...more

Pillsbury - Internet & Social Media Law Blog

From Ashley Madison to the Panama Papers: Is Hacked Data Fair Game?

We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more

Orrick, Herrington & Sutcliffe LLP

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

Blake, Cassels & Graydon LLP

2014 E-Discovery Year in Review

2014 was another eventful year for e-discovery and information management in Canada. Set out below are some of the major trends and developments that emerged over the last year....more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide