News & Analysis as of

Forensic Examination Data Security

Association of Certified E-Discovery...

[Webinar] Digital Forensics in your Incident Response Plan - September 26th, 10:00 am PDT

Organizations face increasingly sophisticated threats that can compromise data and disrupt business operations. This presentation will explore the role that digital forensics plays in an effective incident response plan using...more

Rivkin Radler LLP

DSO’s Computer Systems Hacked

Rivkin Radler LLP on

A recent data breach involving the computer systems of Great Expressions Dental Centers (GEDC) compromised the records of more than 500 Michigan patients. GEDC operates almost 350 dental practices in 10 states, including New...more

TransPerfect Legal

Remote Forensic Collection: Considerations for a WFH Strategy

TransPerfect Legal on

TLS experts Jon Langton and Joseph Marra were pleased to be invited as guests on a podcast published by the International Legal Technology Association (ILTA). The episode, “Forensic Collections in a ‘WFH’ World,” features...more

Seyfarth Shaw LLP

Conducting Trade Secret and Restrictive Covenant Investigations Remotely

Seyfarth Shaw LLP on

One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more

BCLP

How Should Companies Investigate Security Incidents?

BCLP on

As of January 1, 2020, California became the first state to permit residents whose personal information is exposed in a data breach to seek statutory damages between $100-$750 per incident, even in the absence of any actual...more

Adler Pollock & Sheehan P.C.

Are Your Trade Secrets Gone Without A Trace?

Trade secret misappropriation presents a significant concern for companies. Pilfered trade secrets can have devastating effects on a company’s business, especially when trade secrets that are central to the successful...more

Morgan Lewis

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

Morgan Lewis on

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide