News & Analysis as of

Cybersecurity Data Breach Discovery

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Baker Donelson

Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

Baker Donelson on

In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more

EDRM - Electronic Discovery Reference Model

[Webinar] How Legal Must Mitigate Risk in Today's Dangerous and Changing Data Landscape - May 23rd, 1:00 pm - 2:00 pm ET

One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more

Jones Day

Federal Court Grants the SEC Limited Access to the Identities of Law Firm Clients Impacted by a Cyberattack

Jones Day on

In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more

Reveal

The best data retention policy template to get you started (Updated)

Reveal on

Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

EDRM - Electronic Discovery Reference Model

Ransomware Reduces Costa Rica to Pen and Paper

This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered even more, by mainstream media. A ransomware attack by the Conti ransomware group has left the Costa Rican...more

Jenner & Block

Privilege Newsletter: Fitting Consultants Within the Attorney-Client Privilege and Work Product Protection – Cyber Breach...

Jenner & Block on

Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

HaystackID

[Webcast Transcript] Understanding Information Governance, Data Privacy, and Data Breach Exposure

HaystackID on

Editor’s Note: On December 1, 2021, HaystackID shared an educational webcast designed to present and describe a framework for deploying and enhancing organizational information governance programs....more

HaystackID

Wisdom From The Women Leading The Cybersecurity Industry, With Jenny Hamilton of HaystackID

HaystackID on

Editor’s Note: As part of the interview series called Wisdom From The Women Leading The Cybersecurity Industry, author, interviewer, and CEO of Data443 Risk Mitigation, Inc., Jason Remillard, recently shared the following...more

Association of Certified E-Discovery...

[Virtual Event] The Intersection of Cybersecurity and eDiscovery - March 25th, 2:00 pm - 3:00 pm GMT

Cyber-attacks can happen to any organisation around the globe and when an incident or breach occurs, they must act quickly to determine the extent of the data exposure and notify all individuals impacted by the breach....more

Akin Gump Strauss Hauer & Feld LLP

Update: Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. In contrast to an earlier...more

Proskauer - Minding Your Business

Lessons from Wengui v. Clark Hill: Structuring a Two Track Cyber Investigation

As the D.C. District Court in Wengui v. Clark Hill recently commented, “[m]alicious cyberattacks have unfortunately become a routine part of our modern digital world. So have the lawsuits that follow them….” The court’s...more

Hinshaw & Culbertson - Insights for Insurers

Capital One Loses Bid to Shield Post-Breach Report from Consumer Plaintiffs

On June 25, a Federal District Court in Virginia (Anthony J. Trenga, U.S.D.J.) affirmed a Magistrate Judge's Order requiring Capital One to produce a vendor's post-breach forensic report to plaintiffs in a consumer class...more

Hinshaw & Culbertson - Insights for Insurers

No Protection for Vendor's Forensic Report in Post-Breach Litigation? - Preserving Privilege and Work Product Protection in Light...

A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more

Womble Bond Dickinson

Federal Court Finds Cybersecurity Forensic Report Not Privileged Under Attorney Work Product Doctrine

Womble Bond Dickinson on

The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more

Proskauer - Minding Your Business

Maintaining Privilege and Work Product Protections in Dual Purpose (Legal and Business) Investigations

Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more

Association of Certified E-Discovery...

Weekly Trends Report – 1/29/2020 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Orrick, Herrington & Sutcliffe LLP

Influential Sedona Conference Releases Key Guidance for Attorney-Client Privilege and Work-Product Protection in Cybersecurity...

With significant input from Orrick’s Cybersecurity, Privacy and Data Innovation team, the influential Sedona Conference and its Working Group 11 last week published important guidance on the application of the attorney-client...more

Association of Certified E-Discovery...

Weekly Trends Report – 11/7/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

Association of Certified E-Discovery...

Weekly Trends Report – 9/11/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Association of Certified E-Discovery...

Weekly Trends Report – 2/13/2019 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Nutter McClennen & Fish LLP

Equifax’s Proposed Protective Order for Production of Confidential Data Trimmed in Favor of Mass AG

In the litigation between Equifax and Massachusetts Office of the Attorney General, Judge Sanders rejected certain provisions of Equifax’s proposed protective order for the production of sensitive discovery materials,...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide