Information Technology

News & Analysis as of

Three Tips to Verify the Security of Your E-Discovery Software

SOC 2® Type 2 Certification and Zapproved–Building Trust and Confidence that Your Data is Secure - Today in e-discovery, it should be no surprise that cyber security is a rising concern among corporate leaders and that...more

Elevating the role of the in-house counsel

Premise: The role of in-house counsel has evolved and status has been elevated. Expectations have been raised by the C-Suite. The department must be managed like other business units, with adherence to budget, performance...more

Integration of Technology Into Health Care Delivery

The integration of technology into health care delivery is exploding throughout the health industry landscape. Commentators speculating on the implications of the information revolution’s penetration of the health care...more

New Legal Startups Are Changing the Practice of Law

Corporate Counsel recently reported on the dramatic growth of legal startups over the last two years — increasing from 412 to 1,104 today. This showed the increase in innovation targeting legal technology. While it’s valuable...more

Hackers using cyber weapons to attack IT systems

A depressing new report by security firm LightCyber opines that hackers are using cyber weapons to evade detection when deploying attacks to IT systems rather than malware. In fact, the report says that cybercriminals are...more

Considerations for Your Company’s Website Accessibility Policy

We previously discussed the uncertainty concerning whether the Americans with Disabilities Act (ADA) applies to websites of private businesses and, if so, the specific requirements that would apply. We noted that even if...more

3 Takeaways (a Litigator’s Perspective) from CFPB Supervisory Highlights

The CFPB recently issued its newest edition of Supervisory Highlights Mortgage Serving Special Edition, Issue 11 (June 2016). From a litigator’s perspective, the Supervisory Highlights do more than summarize recent...more

House Homeland Security Committee Holds Hearing On 2015 Cybersecurity Act

On June 15, 2016, the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies held a hearing to examine industry perspectives on the implementation of the Cybersecurity Act...more

Five on Friday – Five Recent Developments that We’ve Been Watching Closely: June 2016 #2

It’s Friday and time for another overview of developments in the field of business and human rights that we’ve been monitoring. This week’s post includes: a new guide for business lawyers from the International Bar...more

Department Of Education Issues Guidance on Improving Gender Equity in Career and Technical Education Programs

On June 15, 2016, the U.S. Department of Education’s Office for Civil Rights (OCR) in conjunction with the Department’s Office of Career, Technical, and Adult Education (OCTAE) issued a Dear Colleague Letter (“Letter”)...more

What a Long Strange Trip It’s Been: E-Discovery Travel Guide Prepares Legal Teams for Adventure

The e-discovery process is definitely a trip. With each new matter comes new challenges, variables, data types, and key players—both inside and outside of your organization. And like a road trip, it can be a nightmare or a...more

Agreement Toward Eliminating Tariffs of High-Tech Products to Take Effect July 2016

The European Parliament became the most recent body to ratify an expansion of the expanded World Trade Organization (WTO) Information Technology Agreement (ITA). The deal had previously been committed to and signed by the EU,...more

US-CERT Warns of Old SAP Software Vulnerability

The U.S. Department of Homeland Security Computer Emergency Readiness Team (US-CERT) recently issued an alert to the public about a vulnerability in old software developed by SAP SE that cyberattackers are using to infiltrate...more

Spreadsheets No More: Technology and the Expanding Role of Paralegals in E-Discovery

The role of the paralegal started in the 1960's in an attempt to streamline the delivery and cost efficiency of legal services. Today, that goal remains, especially in the field of E-Discovery. As companies increasingly look...more

Zapproved’s Brad Harris on Fundamentals of a Good Evidentiary Preservation Plan

The duty to preserve evidence is well established; litigants must take reasonable steps to ensure information is not deleted or altered once the duty arises. The duty to preserve applies equally to both plaintiff and...more

Data Privacy Considerations for Starting or Evaluating a Bounty Program

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

SSO – Single Sign On

Due to recent high profile data breaches users have a heightened awareness of security and how they manage or don’t manage their various account credentials. People are beginning to pay more attention to the advice given to...more

I’ve Made a Huge Mistake: Intentional Destruction of ESI is No Illusion

In season three of the series Arrested Development, episode 11 finds George Bluth, Sr. unsurprisingly using a giant electromagnet in an attempt to delete electronic computer files, which could potentially indict him for...more

Privacy Tip #35 – Employees still careless—don’t be that employee

According to a study by Softchoice, 1-in-5 employees still keep their passwords in plain sight (like a Post-it Note on their desk or in the top drawer of their desk—now that’s original), have accessed work files from a device...more

The Taskatron: It Slices and Dices, but will it Optimize Your Legal Process?

We all know what a time saver technology can be. But sometimes, the very thing that's supposed to make our lives easier ends up creating more work than the original task at hand. Often times, Project Management tools can feel...more

When the Jet has been Traded for a Bus: Top 5 Biggest Challenges in Managing E-Discovery Activities

In the 1989 movie, Major League, the rag tag (fictionalized) Cleveland Indians are set up to fail by their owner, who wants to lower attendance so she can move the team to Florida. When the losses aren't piling up fast...more

May The Force be with You: Binding the E-Discovery Process Together

The idea that all things are connected is a comforting one. Some people long to be unified with other people, both loved ones and strangers. Others seek unity with the natural world--flora and fauna, water and stone. Even in...more

North Carolina Legislative Report

Lawmakers will return to Raleigh for the short session April 25, 2016. The MVA Public Affairs Legislative Report on North Carolina will be distributed on a bi-weekly basis during the interim to keep you up to date on the...more

Everything but the Kitchen Sink: New Data Types and E-Discovery

Almost any activity we take part in creates data; it no longer resides just on email servers or your laptop or mobile phones. Data resides in the cloud, in apps, on social media, in your watch or fitness tracker. For...more

E-rate Application Deadline Extended Again

Mel Blackwell, USAC’s Vice President of the E-rate Program, issued a news brief on Friday announcing that, as a result of “unexpected complications with the implementation of USAC’s new IT system,” USAC is extending the...more

155 Results
|
View per page
Page: of 7
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×