News & Analysis as of

Attorney-Client Privilege Data Protection

Lighthouse

From Data to Decisions, AI is Improving Accuracy for eDiscovery

Lighthouse on

You’ve heard the claims that AI can increase the accuracy of analytical tasks during eDiscovery. They’re true when the AI in question is being developed responsibly through proper scoping, iterative testing, and validation....more

Jenner & Block

Protecting Confidential Legal Information Introduction

Jenner & Block on

1. THE ATTORNEY-CLIENT PRIVILEGE - Historically, the attorney-client privilege developed upon two assumptions: (1) good legal assistance requires full disclosure of a client’s legal problems; and (2) a client will only...more

McGuireWoods LLP

Can Any Data Breach Investigation Report Deserve Protection? Part III

McGuireWoods LLP on

The last two Privilege Points have described yet another losing effort to protect a data breach investigation and related communications. In Leonard v. McMenamins Inc., Case No. C22-0094-KKE, 2023 U.S. Dist. LEXIS 217502...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law. - September 28th, 2:00 pm - 3:00 pm BST

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law - September 13th, 1:00 pm - 2:00 pm ET

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

ArentFox Schiff

Develop a Process to Create Privacy Impact Assessments Under the Attorney-Client Privilege

ArentFox Schiff on

Data protection assessments are required for high-risk processing activities in a rapidly growing set of federal, state, and international comprehensive privacy laws. These assessments are triggered by processing activities,...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

Nextpoint, Inc.

How to Protect Attorney Client Privilege in Our Era of Electronic Evidence

Nextpoint, Inc. on

In this excerpt from our free eGuide on protecting attorney-client privilege, we explore the changes in rules regarding privilege and their real-life implications... The right of an attorney to communicate with a client...more

Jenner & Block

Privilege Newsletter: Fitting Consultants Within the Attorney-Client Privilege and Work Product Protection – Cyber Breach...

Jenner & Block on

Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more

Reveal

5 Best Practices For Protecting Sensitive Information During An Investigation

Reveal on

Organizations are feeling the pinch of compliance like never before as government agencies at every level are scrutinizing their business affairs more closely and issuing more regulations. To meet their compliance...more

Epiq

Why no Organization Should be without a Cyber Attorney

Epiq on

Cybersecurity is a top concern for organizations of all shapes and sizes. Whether it be a global organization or a small business, each will inevitably collect and store consumer data that hackers could attempt to steal....more

Epiq

CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)

Epiq on

Jerich Beason is joined by Erik Weinick. Erik's experience includes privacy, cybersecurity, bankruptcy, commercial torts, defamation/slander, regulatory to name a few. He is also the co-founder of Otterburg’s Privacy &...more

Mintz - Privacy & Cybersecurity Viewpoints

Another Court Orders Production of Cybersecurity Firm’s Forensic Report in a Data Breach Case

Another district court just ordered the defendant in a data breach class action to turn over the forensic report it believed was entirely protected from disclosure by the attorney-client privilege and work product doctrine....more

Lighthouse

AI and Analytics: New Ways to Guard Personal Information

Lighthouse on

Big data can mean big problems in the ediscovery and compliance world – and those problems can be exponentially more complicated when personal data is involved. Sifting through terabytes of data to ensure that all personal...more

Poyner Spruill LLP

Court Compels Discovery of Cyber Expert Report in Litigation

Poyner Spruill LLP on

A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more

Wilson Sonsini Goodrich & Rosati

Court Orders Production of a Data Breach Forensic Report, Rejecting Arguments That Attorney-Client Privilege and Work Product...

On January 12, 2021, the District Court of the District of Columbia was the latest court to grant a motion to compel production of a forensic report prepared by an external security-consulting firm in data breach...more

Kelley Drye & Warren LLP

Lessons Learned for Maintaining Attorney-Client Privileged Data Breach Investigation (and other Consultant) Reports

Following a data breach, companies generally launch an investigation to determine the source and scope of the breach. These efforts are often led by in-house privacy, compliance, and/or litigation counsel with an eye firmly...more

BakerHostetler

The Destruction of Privilege and Work Product Protection for Data Breach Investigations?

BakerHostetler on

Attorneys play an important role in the incident response process. A skilled and experienced attorney can help organizations effectively respond to a security incident in a way that complies with obligations, protects key...more

Akin Gump Strauss Hauer & Feld LLP

CCPA: Impacts and Significance for Business

Akin Gump cybersecurity, privacy and data protection co-heads Natasha Kohne and Michelle Reed discuss the California Consumer Privacy Act and its implications for business in this episode recorded in mid-March....more

Locke Lord LLP

Internal Investigations: The Three C’s – Confidence. Credibility. Cost. May 2019

Locke Lord LLP on

Boards of Directors and management at companies of all sizes face a common problem: they need to make decisions that are best for the company and in order to do so they need to know the facts — the pleasant and the unpleasant...more

Association of Certified E-Discovery...

Weekly Trend Report – 4/11/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Locke Lord LLP

Internal Investigations: The Three C’s – Confidence. Credibility. Cost.

Locke Lord LLP on

Boards of Directors and management at companies of all sizes face a common problem: they need to make decisions that are best for the company and in order to do so they need to know the facts — the pleasant and the unpleasant...more

Locke Lord LLP

Internal Investigations: The Three C’s – Confidence. Credibility. Cost.

Locke Lord LLP on

Boards of Directors and management at companies of all sizes face a common problem: they need to make decisions that are best for the company and in order to do so they need to know the facts — the pleasant and the unpleasant...more

BCLP

GDPR: The Most Frequently Asked Questions: Can a litigant use a subject access request as a means of obtaining quasi-discovery?

BCLP on

The European Union's General Data Protection Regulation ("GDPR") is arguably the most comprehensive - and complex - data privacy regulation in the world. Although the GDPR went into force on May 25, 2018, there continues to...more

Akin Gump Strauss Hauer & Feld LLP

In Principle: 10 Things Authorised Firms Need to Know for 2018 – The World of Financial Regulation as the UK Prepares to Exit the...

There is much for authorised firms to consider in the year ahead. Firms have been through the intensive period of the enactment of the second Markets in Financial Instruments Directive (MiFID II), but must now step up their...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide