News & Analysis as of

Cybersecurity Evidence Data Protection

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
HaystackID

[EDRM Workshop Transcript] Managing Data Overload and Complexity in Catastrophic Events

HaystackID on

Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

EDRM - Electronic Discovery Reference Model

Cyber Diplomacy: A New Frontier in International Relations and Professional Practice

ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more

Mayer Brown

Cross-Border Transfer of Evidence from Mainland China under International Commercial Dispute Resolution Scenarios

Mayer Brown on

Cross-border transfer of evidence in litigation or arbitration proceedings is no longer innocuous in today’s world, with countries frequently at odds with each other over data security regulations. This was unexpected a...more

Jones Day

Federal Court Grants the SEC Limited Access to the Identities of Law Firm Clients Impacted by a Cyberattack

Jones Day on

In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more

Troutman Pepper Locke

Int'l Arbitration Rules Revision Reflects Flexible Approach

Troutman Pepper Locke on

On Feb. 15, the International Bar Association released the long-awaited update, adopted by the IBA Council on Dec. 17, 2020, to the IBA Rules on the Taking of Evidence in International Arbitration. Originally published in...more

Orrick, Herrington & Sutcliffe LLP

The Revision of the IBA Rules on the Taking of Evidence in International Arbitration: Catching Up With Reality

On 15 February 2021, the International Bar Association (the IBA) released its updated Rules on the Taking of Evidence in International Arbitration (the IBA Rules or the Rules).  The updated Rules were adopted on 17 December...more

Oberheiden P.C.

5 Keys to Picking the Best Digital Forensics Company

Oberheiden P.C. on

From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more

Hogan Lovells

Data class actions in Europe and spotlights in Mexico, Russia and the U.S.

Hogan Lovells on

The General Data Protection Regulation 2016/679 (GDPR) provides means to enforce provisions related to personal data processing by you as a data controller or data processor. It introduces collective actions everywhere in...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide