News & Analysis as of

Cyber Crimes Electronically Stored Information

EDRM - Electronic Discovery Reference Model

From Sextortion to Financial Scams: The Expanding Reach of Deepfakes

ComplexDiscovery’s Editor’s Note: Deepfake technology represents one of the most pressing challenges for cybersecurity and governance professionals today....more

EDRM - Electronic Discovery Reference Model

Zero Trust Networks

A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more

EDRM - Electronic Discovery Reference Model

What the Heck is Going on with Legal Industry Data Breaches

With Memorial Day weekend behind us, many people are celebrating the unofficial start of summer. And summer is almost always a blessing—nicer weather, beach vacations, shorter Fridays (if you’re lucky)—you’ve got to think...more

J.S. Held

What Is Digital Forensics: Applications, Processes, and Real-World Scenarios

J.S. Held on

This paper will cover the application of digital forensics, the types of data digital forensics experts work with, the investigation process, and some example scenarios wherein digital forensics experts are called to help...more

Epiq

The Ins and Outs of Early Case Assessment for a Cyber Incident Review

Epiq on

In the fast-moving industry of cyber incident response, success and efficiency come from preparation. Once a matter is promoted to review, the most common request for timing is “as soon as possible.” How is a client’s desire...more

Reveal

Be Aware, Be Very Aware – of Cybersecurity Awareness Month!

Reveal on

Tomorrow is October 1st, and the end of the month is Halloween. So, the phrase “be afraid, be very afraid” (a tagline* which came from the 1986 movie The Fly) seems very appropriate for the end of October. But the phrase “be...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Association of Certified E-Discovery...

Defining Doxing And Learning How to Avoid It

From August 2015 to August 2017, a man named Rodney Phipps was sentenced to prison for making fake phone calls to emergency services—calls that would end up sending SWAT and police to strangers’ residences in practice known...more

Farrell Fritz, P.C.

What Do Lady Gaga, LeBron James And The Texas Courts Have In Common?

Farrell Fritz, P.C. on

Give up? Each recently made headlines in connection with ransomware — a form of malware that encrypts a victim’s electronic files. The attacker then demands a ransom – typically payable in bitcoin – from the victim to...more

Health Care Compliance Association (HCCA)

Report on Research Compliance 17, no. 5. In This Month's E-News: May 2020

Report on Research Compliance 17, no. 5 (May 2020) - Cybercriminals are “sending malicious phishing emails that appear to be from trusted federal agencies,” such as HHS, in order to “steal sensitive data,” warned Michael...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

Bracewell LLP

CLOUD Act Aims for Clear Skies: Bipartisan CLOUD Act Seeks to Clarify Law Enforcement Access to Overseas Data

Bracewell LLP on

In October 2017, the Supreme Court granted the Department of Justice’s petition to review the Second Circuit’s decision that limits the reach of warrants issued under the Stored Communications Act (“SCA”). Specifically, the...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Robinson+Cole Data Privacy + Security Insider

Connecticut State Police Lead the Way in Training Electronic Storage Device Dogs

The Connecticut State Police have taken the lead in training police dogs skilled in the art of detecting hidden data. As more and more crimes involve electronic evidence, criminal enforcement agencies throughout the country...more

Robinson+Cole Data Privacy + Security Insider

Back to Basics: Low tech tips to alleviate high tech headaches

It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more

Morrison & Foerster LLP

China Proposes Draft Privacy Legislation with Significant Potential Implications

On July 6, 2015, China’s legislature, the National People’s Congress (NPC), circulated for comment two pieces of draft legislation with significant potential implications for data privacy and data security in China. Comments...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide