News & Analysis as of

Passwords Data Collection

EDRM - Electronic Discovery Reference Model

January’s Notable Cases and Events in E-Discovery

[Editor’s Note: This article was first published January 17, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of...more

Nextpoint, Inc.

Tips for Moving Data to a New eDiscovery Platform

Nextpoint, Inc. on

Legal data migration in ediscovery can seem overwhelming, but a proper plan will keep the process simple. Here’s what you should keep in mind when moving data to a new ediscovery platform. Change is inevitable, and that...more

Venable LLP

[Webinar] CFPB Weighs in on Data Security; Will Firms with Poor Security Be in the Crosshairs? - October 14th, 1:00 pm - 2:00 pm...

Venable LLP on

In the late summer, the Consumer Financial Protection Bureau (CFPB) issued a circular that concluded in no uncertain terms that insufficient data protection or information security could be considered an unfair practice under...more

Amundsen Davis LLC

Employers’ Rights Under the Computer Fraud and Abuse Act (CFAA) Narrowed after Supreme Court Decision in Van Buren

Amundsen Davis LLC on

In today’s digital age, employers store immense amounts of information, including confidential and proprietary information, on their on-premises systems, cloud-servers and other data storage solutions. With this collection of...more

Butler Snow LLP

Has Your Company's BYOD Policy Withstood to the Test of Time?

Butler Snow LLP on

Many companies have implemented Bring Your Own Device (“BYOD”) policies. For some, it has been years since they were put in place. Has your policy withstood the test of time? Employees are using their devices differently than...more

Kerr Russell

Investing In Your Privacy

Kerr Russell on

As people have come to learn this week (many for the first time), the stock market is a volatile tool through which earnings are made and lost in the literal blink of an eye. We, of course, do not intend to provide investing...more

Sunstein LLP

Exploitation of Publicly Available Website Data May be Unstoppable

Sunstein LLP on

Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2019 #2

Robinson & Cole LLP on

The Ecuadorian Ministry of Telecommunications and Information Security has announced an investigation into data analytics company Novaestrat after news broke this week that the company left an Elasticsearch server open...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - September 2018 #4

Robinson & Cole LLP on

The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more

Robinson+Cole Data Privacy + Security Insider

Do You Have “Security Fatigue”?

Every day it seems a new data security breach has occurred, a new “cyber hack” is in the news…making us run to our phones, computers, bank accounts, you name it, to see if we could be the “one” affected. As a result, more and...more

Arnall Golden Gregory LLP

Six Ways for Data-Driven Medical Device Companies to Implement Effective Privacy and Security Measures

The increasing amounts of health information being generated, stored and collected have heightened the special risks medical device manufacturers have long faced. In addition to the nexus to patient health and safety, if a...more

Robinson+Cole Data Privacy + Security Insider

PII in your ESI: The Intersection of Data Privacy and E-Discovery

There is a significant nexus between data privacy and security and e-discovery that grows more pronounced as the volume of data generated multiplies exponentially and the ability of e-discovery tools to collect and process...more

Arnall Golden Gregory LLP

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

Troutman Pepper

Be Careful What You Ask For: Michigan Limits Employer Access To Personal Social Media

Troutman Pepper on

Michigan’s Internet Privacy Protection Act (IPPA) prohibits employers from gaining access to applicant and employee personal Internet accounts. When the IPPA became effective on December 28, 2012, Michigan joined Maryland,...more

Morrison & Foerster LLP - Social Media

Socially Aware: The Social Media Law Update -- Volume 4, Issue 1 -- January/February 2013

In this issue of Socially Aware, our Burton Award-winning guide to the law and business of social media, we explore the challenges that arise when employers and employees battle over work-related social media accounts; we...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide