A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
EEO-1 Filing After June 4: What to Do Now, and How to Prepare for Next Year - Employment Law This Week®
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
Calculating eDiscovery Costs: Tips from Brett Burney
State AG Pulse | Content moderation vs. free expression
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
Navigating the Digital Frontier: Employee Privacy Rights and Legal Obligations in the Modern Workplace
DE Under 3: OMB Announced Finalized Overhaul to Federal Race & Ethnicity Data Collection Standards
Embracing Data Privacy to Drive Business Growth: On Record PR
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
PODCAST: Williams Mullen's Trending Now: An IP Podcast - U.S. State Data Privacy Update
Managing Large Scale Review Efficiency: Tips From a GC
AD Nauseam – Children, They are Indeed Our Future – COPPA Developments
1071 Rule Status — The Consumer Finance Podcast
Data Dividend: What is Personal Data Worth?
The Great Link Debate and the Future of Cloud Collaboration
RegFi Episode 9: Consumer Data Collection and Usage with Eric Ellman
If you’re an attorney, a paralegal, an investigator, a law enforcement officer, or even if you just watch a lot of legal dramas on television, you’re likely familiar with the term “chain of custody”....more
The International Data Corporation (IDC) estimates that by 2025, the world will have 175 zettabytes of digital data—which, if stored on DVDs, would create a stack tall enough to circle the earth 222 times. As organizations...more
It’s an ever-present threat in our digital world: You get sued, and the case involves your software, website, and/or customer data. The first step in any filed or threatened litigation is to implement a litigation hold to...more
Boshea v. Compass Marketing, Inc., 2023 WL 2743333 (D. Md. Mar. 31, 2023)(Hollander, J.), involved authentication of disputed electronically stored information. “Authentication” is a necessary predicate to all uses of ESI:...more
By using our smartphones, tablets and computers, we create and exchange a vast amount of electronic data every day, but what some may not know is that there is a whole other world of information hidden beneath the surface —...more
Read these ediscovery collection best practices to learn why self-collection – or allowing clients to collect their own data – is dangerous. Picture this: it’s 1988 and you’re at your desk, poring over a veritable...more
The submission of digital evidence traditionally required a sponsoring witness—something that could be time-consuming and expensive. Thankfully, as more and more online content, such as social media posts and chats, play a...more
Healthcare research has faced severe disruption during the COVID-19 public health emergency and underscored the need for novel technological solutions that harness and utilize data beyond traditional clinical research models....more
With strengthened legislative mandates and significant regulatory reform in place, the U.S. government’s national security focus on protecting sensitive technology and data continues to gather steam. Although exactly what...more
The Internet of Things (IoT) is booming. Smart cars, wearable health trackers, connected medical devices, drones—entrepreneurs and evolving industry are connecting to the world in ways only science fiction writers imagined....more