News & Analysis as of

Information Technology

Pillsbury - Gravel2Gavel Construction & Real...

Anatomy of a Data Center

Traditional and social media are thick with reports and predictions of the remarkable increase in size, power consumption and significance of data centers. Not only technology companies but real estate and energy developers,...more

BCLP

The EU’s Digital Operational Resilience Act 2022/2554 (DORA)

BCLP on

Long IT sub-contracting chains can make it hard for financial institutions to understand the vulnerabilities in their IT estate and the location of key functions (where these may be located in entities who do not have a...more

Thomas Fox - Compliance Evangelist

Tone at the Top Week: Part 3-Email as a Strategic Compliance Tool

We continue our exploration of how CEOs and senior executives are uniquely positioned to drive home the importance of ethical behavior and adherence to compliance regulations. Today, we consider the humble email and how it...more

BakerHostetler

[Podcast] Technology from the Top: AI, Data and the Future of Business with Today’s CIOs – DeWayne Griffin

BakerHostetler on

Partner Janine Anthony Bowen sits down one-on-one with current Chief Information Officers in the new series, “Technology from the Top: AI, Data and the Future of Business with Today’s CIOs” to discuss how they are adjusting...more

Ankura

New Health Information Technology Standards for Medicare Part D

Ankura on

On June 17, 2024, the final rule for Medicare Part D introduced new health IT standards, mandating the adoption of NCPDP SCRIPT Standard version 2023011 by January 1, 2028, while the NCPDP Formulary and Benefit (F&B) Standard...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part IV - Data Deletion Dilemma: A Unified Approach to Defensible Data Disposal - September 26th,...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Cimplifi

Cracking the Code on Modern Attachments in eDiscovery

Cimplifi on

Modern attachments, in Google Workspaces and Microsoft Office, have long posed significant challenges in eDiscovery. They are not actual files attached to an email or message but are links pointing to files stored elsewhere....more

Association of Certified E-Discovery...

[Event] Generative AI – Navigating eDiscovery - September 18th, Vancouver, Canada

Join Greg Sullivan and Matt Maslow from Deloitte, as they showcase how they have harnessed Generative AI to overcome some of the most persistent challenges in eDiscovery review. Drawing from their experience building a custom...more

BakerHostetler

Technology from the Top: AI, Data and the Future of Business with Today’s CIOs

BakerHostetler on

Partner Janine Anthony Bowen sits down one-on-one with current Chief Information Officers in the new series, “Technology from the Top: AI, Data and the Future of Business with Today’s CIOs” to discuss how they are adjusting...more

Littler

What Immigration Changes Can UK Employers Expect from the Labour Government?

Littler on

Under the previous UK Home Secretary, James Cleverly, minimum salary thresholds for Skilled Worker visas were raised significantly and the 20% discount for shortage occupations were eliminated....more

McCarter & English Blog: Government Contracts...

DOJ Went Down to Georgia: Lessons Learned from Recent Cybersecurity Enforcement Actions

Some might say there’s little difference between dealing with the devil and being a federal contractor. And for the unwary or unprepared, that may not be far off. Federal contracting comes with a litany of “fine print” that...more

Perkins Coie

Cybersecurity for Lawyers: Open-Source Software Supply Chain Attacks

Perkins Coie on

In this post in our series on basic cybersecurity concepts for lawyers, we address open-source software (OSS) supply chain risk. OSS is software developed using an “open-source” protocol, meaning that its code is fully...more

Alston & Bird

United States Cybersecurity and Infrastructure Security Agency Issues Joint International Guidance for Event Logging and Threat...

Alston & Bird on

On August 21, 2024, the United States Cybersecurity and Infrastructure Security agency, alongside government agencies in key global allies, including Australia, the UK, Canada, and Japan, released guidance on event logging...more

Burr & Forman

Healthcare Provider Disincentives for Information Blocking

Burr & Forman on

On June 31, 2024, the Department of Health and Human Services (“HHS”) published a final rule establishing penalties for healthcare providers who violate the information blocking rules implemented under the 21st Century Cures...more

McCarter & English, LLP

Medicare Technology Standards for Prescribing Part D Drugs

The Centers for Medicare & Medicaid Services (CMS), the Office of the National Coordinator for Health Information Technology (ONC), and thr Department of Health and Human Services (HHS) published 89 FR 51238 (the Final Rule),...more

TransPerfect Legal

Search Terms – Advice from the Experts

TransPerfect Legal on

As data volumes grow, the use of technology to make sense of it is increasing – especially within disputes and investigations where the key data is buried within thousands or millions of documents, emails, text messages,...more

IMS Legal Strategies

Should Your Gen Z Attorney Be Your Hot Seat Operator?

IMS Legal Strategies on

Gen Z attorneys are often extremely valuable, hard-working additions to your trial team. We are sure many of our clients would agree, as we worked alongside quite a few truly impressive young trial attorneys....more

Warner Norcross + Judd

Managing Cybersecurity Risk for Family Offices and Businesses

Warner Norcross + Judd on

Whether caused by family member thoughtlessness, employee error or the acts of a skilled data thief, everyone is likely to be the victim of an information breach at some point. A cyberattack on a family office or family...more

Mayer Brown

Singapore's Green Data Centre Roadmap – Representing a Necessary Intersection between Digital Infrastructure and Sustainability

Mayer Brown on

1. Introduction - The demand for digital infrastructure has seen exponential growth in the recent years, largely driven by the larger economic trend of digitalisation and artificial intelligence (AI) being harnessed and...more

DLA Piper

Hong Kong: A Practical Guide to the Proposed Critical Infrastructure Cybersecurity Legislation

DLA Piper on

Hong Kong is following other jurisdictions, including Mainland China, Singapore and the UK, in proposing to enhance cybersecurity obligations on IT systems of those operating critical infrastructure (“CI“). While the proposed...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #411 – Phishing Attacks Increased 40% in 2023

Everyone thinks they can spot a phishing email. If true, we would not see so many security incidents, data breaches, and ransomware attacks. The statistics are overwhelming that phishing emails are a significant cause of data...more

Epiq

The Top Five Questions Legal Should Ask IT During Copilot for Microsoft 365 Adoption

Epiq on

It’s no longer hype. Organizations are broadly looking to adopt Gen AI to drive productivity across their workforce.   There’s also end-user demand to satisfy. People use Gen AI in their personal lives and want to use it...more

CloudNine

ILTACON 2024 – Practical Innovation with Today’s Data on Display (Even New Developments in AI for eDiscovery!)

CloudNine on

Nashville offers countless reasons to visit, but when you combine the city’s talent and energy with the legal community’s convergence at the Gaylord Opryland Resort and Convention Center, you create an unforgettable...more

Array

This Week in eDiscovery: Email Preservation or Computer Fraud? Recording Meet-and-Confers

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of August 12-18. Here’s what’s...more

1,876 Results
 / 
View per page
Page: of 76

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide