News & Analysis as of

Cybersecurity Document Productions

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
HaystackID

[Webinar] 6 AI Workflows to Enhance ESI Discovery - September 18th, 11:00 am CDT

HaystackID on

Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more

WilmerHale

Navigating China’s Data Security Laws in US Discovery

WilmerHale on

The enactment of China’s Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law (PIPL, together with the CSL and the DSL, “Data Security Laws”) has significantly reshaped the landscape of...more

HaystackID

[Webcast Transcript] The Hierarchy of Technology-Assisted Review: From Active Learning to Optimal Results

HaystackID on

Editor’s Note: On March 16, 2022, HaystackID shared an educational webcast developed to highlight insight into the world of active learning (AL) workflows through a combination of proven experience, expert processes, and...more

Orrick, Herrington & Sutcliffe LLP

The Revision of the IBA Rules on the Taking of Evidence in International Arbitration: Catching Up With Reality

On 15 February 2021, the International Bar Association (the IBA) released its updated Rules on the Taking of Evidence in International Arbitration (the IBA Rules or the Rules).  The updated Rules were adopted on 17 December...more

Oberheiden P.C.

Theft of U.S. Companies’ IP Assets and Other National Security Issues Involving Foreign Governments and Foreign-Controlled...

Oberheiden P.C. on

Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more

Proskauer - Minding Your Business

District Court Affirms Order Requiring Production of Cyber-Investigation Report after Considering Totality of Circumstances

As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more

Hinshaw & Culbertson - Insights for Insurers

Capital One Loses Bid to Shield Post-Breach Report from Consumer Plaintiffs

On June 25, a Federal District Court in Virginia (Anthony J. Trenga, U.S.D.J.) affirmed a Magistrate Judge's Order requiring Capital One to produce a vendor's post-breach forensic report to plaintiffs in a consumer class...more

Hinshaw & Culbertson - Insights for Insurers

No Protection for Vendor's Forensic Report in Post-Breach Litigation? - Preserving Privilege and Work Product Protection in Light...

A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more

Womble Bond Dickinson

Federal Court Finds Cybersecurity Forensic Report Not Privileged Under Attorney Work Product Doctrine

Womble Bond Dickinson on

The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more

Proskauer - Minding Your Business

Maintaining Privilege and Work Product Protections in Dual Purpose (Legal and Business) Investigations

Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more

Association of Certified E-Discovery...

Weekly Trends Report – 1/29/2020 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Jones Day

Trouble in Paradise: No Privilege for Stolen Documents

Jones Day on

The Situation: In an era of sophisticated cyberattacks and data leaks, questions have been raised over whether the doctrine of legal professional privilege ("LPP") should be extended to provide clients with a legal right to...more

Fisher Phillips

Strict Privacy and Data Security Bill Introduced in North Carolina

Fisher Phillips on

Early last year, I posted about tougher, bi-partisan privacy and data security legislation in the works in North Carolina. North Carolina State Representative Jason Saine (R), Senior Appropriations Chair, teamed-up with North...more

Nutter McClennen & Fish LLP

Equifax’s Proposed Protective Order for Production of Confidential Data Trimmed in Favor of Mass AG

In the litigation between Equifax and Massachusetts Office of the Attorney General, Judge Sanders rejected certain provisions of Equifax’s proposed protective order for the production of sensitive discovery materials,...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide