News & Analysis as of

Cloud Computing Data Collection Data Security

Purpose Legal

Seamless Integration: Why Infrastructure-as-a-Service is Essential for eDiscovery

Purpose Legal on

Infrastructure-as-a-Service (IaaS) is a vital model for law firms seeking better ways to organize eDiscovery data and streamline the discovery process. With thousands of documents and pieces of information to collect,...more

Foley & Lardner LLP

FDA Clinical Investigations: New Guidance on Electronic Systems

Foley & Lardner LLP on

On October 2, 2024, the U.S. Food and Drug Administration (FDA) released guidance in a question and answer format regarding the use of electronic systems, electronic records, and electronic signatures in clinical...more

Ankura

Expert Insights on Resolving Common Cloud Computing Disputes

Ankura on

In today's business landscape, cloud computing is an essential component for scalability, cost-efficiency, and operational agility. However, as dependence on cloud services grows, disputes are becoming increasingly frequent....more

Holland & Knight LLP

Holland & Knight Data Privacy and Security Report: March 2023

Holland & Knight LLP on

Welcome back to Holland & Knight's monthly data privacy and security news update that includes the latest in policy, regulatory updates and other significant developments. ...more

EDRM - Electronic Discovery Reference Model

[Webinar] Cloud Utility Pricing: Reduce Hosting Costs and Go Green in the Bargain - March 9th, 10:00 am - 11:15 am PST

Since the dawn of the digital age, ediscovery vendors have charged for hosting the way landlords charge for rent: by the month. As with a rental home, you pay hosting fees for ediscovery sites even when you aren’t using them....more

EDRM - Electronic Discovery Reference Model

Castles in the Cloud? Single-Tenant Architecture: A New Paradigm for Cloud Security

Single-Tenant Architecture: A New Paradigm for Cloud Security - Alarm bells rang when  several respected ediscovery providers announced they had shut down their sites due to security breaches. The causes were different for...more

Nextpoint, Inc.

Managing Ediscovery In The Cloud: Essential Questions to Ask Potential Providers

Nextpoint, Inc. on

As we explained in our last post, managing ediscovery in the cloud is the only viable solution for dealing with the massive amount of electronic data involved in litigation today. Nextpoint has been an advocate for...more

Association of Certified E-Discovery...

[Webinar] Using AI eDiscovery Tools to Create Business Solutions in Different Industries - October 19th, 1:00 pm - 2:00 pm EDT

Using eDiscovery tools to solve business problems in other industries? Blasphemy! Not anymore. From securing confidential data, providing worldwide access, dealing with privacy, effective use of AI, creating data lakes and...more

McDermott Will & Emery

[Webinar] McDermottTech 2020 - September 29th, 5:30 pm - 7:45 pm CET

McDermott Will & Emery on

We invite you to attend McDermottTech 2020, a virtual conference exploring the latest global trends impacting the technology and outsourcing industry. Please join us for this complimentary program on 29 September for the...more

Hogan Lovells

COVID-19 Exit Strategy: A Global Privacy and Cybersecurity Guide - May 2020

Hogan Lovells on

As the world focuses its efforts on the right strategy to beat the coronavirus and make normal life safe again, businesses are devising and implementing a variety of measures to deal with the COVID-19 crisis which rely on the...more

Foley & Lardner LLP

Three Trending Topics in IoT: Privacy, Security, and Fog Computing

Foley & Lardner LLP on

Cisco has estimated that there will be 50 billion Internet of Things (IoT) devices connected to the Internet by the year 2020. IoT has been a buzzword over the past couple of years. However, the buzz surrounding IoT in the...more

Morgan Lewis

Advocate General Of ECJ Rules EU Data Protection Authorities Can Investigate Complaints About Safe Harbor Programme

Morgan Lewis on

Data transfers can be suspended until investigation is complete. In Maximillian Schrems v. Data Protection Commissioner (case C-362/14), the Advocate General ruled that EU data protection authorities do have powers to...more

Pillsbury - Global Sourcing Practice

Strange Bedfellows: Technology Issues in Real Estate Transactions, Part 2

This blog is the second part of a two-part series on key contracting issues with technology service providers, and the focus is specifically geared toward companies doing business in the real estate industry. As noted in Part...more

Foley & Lardner LLP

This Is Not Your Father's Oldsmobile: Car Hacking and the SPY Car Act

Foley & Lardner LLP on

Not coincidentally, on July 21, 2015, Wired Magazine published an article with groundbreaking evidence of hacking a car wirelessly, and Senators Edward Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide