News & Analysis as of

Confidential Information Attorney-Client Privilege Cybersecurity

HaystackID

Navigating International Discovery Restrictions: Seven Recommendations

HaystackID on

Background Note: International discovery exercises and investigations can be a complex and challenging process for cybersecurity, information governance, and eDiscovery professionals. Navigating the different laws and...more

McDermott Will & Emery

[Webinar] That's All Folks! Have Federal Courts Killed Privilege Protections for Forensic Reports? - January 20th, 12:00 pm - 1:00...

McDermott Will & Emery on

Privacy Litigation Webinar Series Part 1 - Our Global Privacy & Cybersecurity team will be hosting a monthly webinar series on key issues and developments in privacy litigation. Confidentiality is a fundamental...more

Poyner Spruill LLP

Court Compels Discovery of Cyber Expert Report in Litigation

Poyner Spruill LLP on

A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more

Hinshaw & Culbertson - Insights for Insurers

No Protection for Vendor's Forensic Report in Post-Breach Litigation? - Preserving Privilege and Work Product Protection in Light...

A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more

Womble Bond Dickinson

Federal Court Finds Cybersecurity Forensic Report Not Privileged Under Attorney Work Product Doctrine

Womble Bond Dickinson on

The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more

Nutter McClennen & Fish LLP

How to Structure Your Organization’s Cybersecurity Management

Q: Who in a company is vital for cybersecurity management? Seth Berman: Cybersecurity is everyone’s responsibility. The board and senior management must set the priorities and shape the culture, but even the lowest-level...more

Patterson Belknap Webb & Tyler LLP

Data-Security Assessments? You’re Going to Want a Lawyer for That

These days, data breaches and cybersecurity attacks abound. With each news cycle, we’re confronted with stories about yet another big breach, at another big company, with the potential exposure of another big pool of...more

Orrick, Herrington & Sutcliffe LLP

Court Says Cyber Forensics Covered by Legal Privilege

The Middle District of Tennessee recently issued a key decision in the ongoing Genesco, Inc. v. Visa U.S.A., Inc. data breach litigation. The court denied discovery requests by Visa for analyses, reports, and communications...more

Eversheds Sutherland (US) LLP

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Law firms increasingly turn to “cloud services” for processing and storing confidential client information because of their greater flexibility and efficiency. Use of “the cloud,” however, outsources the administration,...more

Blake, Cassels & Graydon LLP

2014 E-Discovery Year in Review

2014 was another eventful year for e-discovery and information management in Canada. Set out below are some of the major trends and developments that emerged over the last year....more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide