Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
9/19/2019
/ California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Privacy ,
Discovery ,
e-Discovery Professionals ,
EDRM ,
Electronically Stored Information ,
General Data Protection Regulation (GDPR) ,
Information Governance ,
Legal Project Management ,
Legal Technology ,
NIST
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
9/11/2019
/ California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
General Data Protection Regulation (GDPR) ,
Information Governance ,
Legal Technology ,
Privacy Laws
ABOVE THE FOLD -
Join Mary Mack and me for a new ACEDS webinar series, Monthly Insights with George Socha & Mary Mack, starting Wed. Sept. 11.
Relativity Fest Oct. 20-23 – Join us this fall at Relativity Fest in...more
9/5/2019
/ California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Data Security ,
Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
General Data Protection Regulation (GDPR) ,
Information Governance ,
Legal Technology ,
Privacy Laws ,
SHIELD Act
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
8/8/2019
/ Artificial Intelligence ,
California Consumer Privacy Act (CCPA) ,
Cookies ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Security ,
Data-Sharing ,
e-Discovery Professionals ,
Electronically Stored Information ,
Facebook ,
General Data Protection Regulation (GDPR) ,
Information Governance ,
Legal Project Management ,
Legal Technology ,
Machine Learning ,
Personal Data ,
State Data Privacy Laws
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In Part 2, we turned to the types of information you can expect to encounter with mobile devices and key considerations for...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
7/17/2019
/ Artificial Intelligence ,
Biometric Information ,
California Consumer Privacy Act (CCPA) ,
Cybersecurity ,
Data Privacy ,
Discovery ,
e-Discovery Professionals ,
Electronically Stored Information ,
General Data Protection Regulation (GDPR) ,
Legal Technology ,
Privacy Laws
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
This is the third in a series of posts evaluating the results of Exterro and Duke/EDRM’s 2019 survey of Federal district court and magistrate judges. With information from over 250 judges, the survey data offers a rich trove...more
In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In this article, we turn to the types of information you can expect to encounter with mobile devices and key considerations...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
This is the second in a series of posts evaluating the results of Exterro and Duke/EDRM’s 2019 survey of Federal district court and magistrate judges. With information from over 250 judges, the survey data offers a rich trove...more
This is the first in a series of posts evaluating the results of Exterro and EDRM’s 2019 survey of Federal district court and magistrate judges. With information from over 250 judges, the survey data offers a rich trove to...more
Mobile devices, especially smartphones, have become home to all manner of data about what we do. That means they should be seems as a key potential source of potentially relevant electronically stored information....more