News & Analysis as of

Discovery Hackers

Kohrman Jackson & Krantz LLP

How a John Doe Lawsuit Can Help You Unmask the Source of Fake Reviews, Defamation, and Harassment

The internet holds some of the largest threats an individual or business can face in 2024. Online threats can become even more challenging to address when the attacker acts anonymously...more

EDRM - Electronic Discovery Reference Model

OpenAI Generates a ‘Hired Gun Hacker’ Defense to the N.Y. Times Copyright Case

Most everyone in the AI and legal worlds by now knows about the New York Times (“NYT”) suit against Microsoft and various Open AI entities (“OAI”). The NYT alleges copyright infringement by the practice of OAI, and most all...more

EDRM - Electronic Discovery Reference Model

DefCon Chronicles: Hackers Respond to President Biden’s Unprecedented Request to Come to DefCon to Hack the World for Fun and...

Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more

Jones Day

Federal Court Grants the SEC Limited Access to the Identities of Law Firm Clients Impacted by a Cyberattack

Jones Day on

In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more

Cozen O'Connor

Statement Of Work Can Make Or Break Discoverability Of Data Breach Report

Cozen O'Connor on

A recent decision from a federal court in Pennsylvania highlights the importance of a carefully crafted statement of work (“SOW”) when commissioning an investigative report in response to a data security breach. A convenience...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 4, August 2020

Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more

Epiq

Yes, Blockchain Can Be Hacked Too

Epiq on

Many different organizations, including those in the legal industry, use blockchain for several business functions. Blockchain allows users to record transactions over a distributed network of computers. The server is secure...more

Patterson Belknap Webb & Tyler LLP

NY Appellate Court Slams “Egregious Litigation Misconduct” and “Improperly Accessed” Email Communications

When we hear about discovery abuses in litigation, we often think of overzealous lawyers using obstructionist tactics. Such behavior, however, rarely involves litigants “improperly accessing” the email communications of an...more

Fenwick & West LLP

Appellate Court Affirms Dismissal of Former Employee's Data Breach Claims

Fenwick & West LLP on

The U.S. Court of Appeals for the Third Circuit has found that plaintiffs must show a causal connection between the theft of their personal information and the purported harm that they have suffered in order to survive a...more

Association of Certified E-Discovery...

Bold Thinking, Not Tinkering - What is the Hackathon's purpose?

The Hackathon brings together multiple streams of entrepreneurial activity (internationally) and taps into a global community of individuals and organizations with a passion for innovation via legal technology. Given that it...more

Farrell Fritz, P.C.

Surreptitious Cyber-Conduct Results In New York County Decision Striking Defendant’s Answer

Farrell Fritz, P.C. on

In a decision dated May 26, 2017, Justice Chan of the Supreme Court of the State of New York, New York County, struck the defendant’s answer. Although the Court acknowledged that the imposition of this particular sanction...more

Pillsbury - Internet & Social Media Law Blog

Ashley Madison Update: Hacked Data Is Off-Limits

On April 29, 2016, Judge Ross issued his ruling on Ashley Madison’s motion for a protective order, prohibiting Plaintiffs from using the leaked documents, reports quoting the leaked documents, and information “stolen from...more

Manatt, Phelps & Phillips, LLP

Corporate Investigations & White Collar Defense - October 2015

"Wherefore Art Thou Due Process?" Part III - Why it matters: It is time for another installment in our continuing "Wherefore Art Thou Due Process?" coverage into the ongoing constitutional challenges to the SEC's...more

Pillsbury - Internet & Social Media Law Blog

Discovery Rules Continue to Evolve for Cases Involving Social Media

Your social media content is not only susceptible to hacking; it’s also susceptible to disclosure requests from civil litigants (see our Sept. 14 blog post for more details) and even prosecutors without your consent if they...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide