The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Innovations in Compliance: Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye
Early Days of the Trump Administration: Impact on the CFPB — The Consumer Finance Podcast
CFPB's Inquiry Into Payments Privacy — Payments Pros – The Payments Law Podcast
Innovation in Second Requests: Data is Your Greatest Asset
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
The Presumption of Innocence Podcast: Episode 48 - Digital Boundaries: Fourth Amendment Protections in a Connected World
eDiscovery Needs Digital Forensics for a Mobile World
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
EEO-1 Filing After June 4: What to Do Now, and How to Prepare for Next Year - Employment Law This Week®
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
Calculating eDiscovery Costs: Tips from Brett Burney
State AG Pulse | Content moderation vs. free expression
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
Navigating the Digital Frontier: Employee Privacy Rights and Legal Obligations in the Modern Workplace
Whether we refer to them as “linked documents” or “modern attachments,” gathering the information contained in these files poses an increasing challenge in the ever-evolving e-discovery landscape. I had the privilege of...more
Seven years ago, I wrote an article about what I called the eDiscovery Disconnect—the gap between the work being done on data and the legal strategy that drives discovery. Unfortunately, not much has changed since then, but...more
Are emojis legally binding? Can they be used as evidence in court? The answer is complicated....more
The intersection of litigation, investigations, and technology is becoming increasingly vital to the success of legal teams. As organizations face mounting pressures from data proliferation, complex regulatory landscapes, and...more
CloudNine, a leading eDiscovery technology and services provider, is hosting an in-person "lunch and learn" discussion in Charlotte on April 23 from 12:30-2pm ET on how to grapple with the challenges of short message data...more
Safeguarding against evidence spoliation ahead of litigations, audits, or investigations is a lot easier when you have a timely, defensible legal hold process. In this conversation, take a look at how to achieve this by...more
Litigation in our modern digital age often forces legal teams to sift through a mountain of electronic data to find potential evidence. Early Data Assessment can reduce this mass of data and give legal teams valuable insight...more
Read these ediscovery collection best practices to learn why self-collection – or allowing clients to collect their own data – is dangerous. Picture this: it’s 1988 and you’re at your desk, poring over a veritable...more
While most legal professionals are familiar with legal holds, that doesn’t mean they look forward to receiving one. While properly executing a legal hold doesn’t have to be complicated, compliance requires careful planning...more
Law firms who can locate and evaluate relevant information at the outset of a legal matter keep clients and win cases. These same firms do so with a bullet-proof Early Case Assessment workflow....more
The rise of electronically stored information (ESI) is both a blessing and a curse for eDiscovery professionals. On one hand, it can be easier to manage and handle digital data than to find yourself buried in paper...more
Join Doug Austin, Editor of eDiscovery Today, Mary Mack, CEO of EDRM, Tom O’Connor, Director of Gulf Legal Technology Center, and Hon. Andrew Peck (Ret.), Senior Counsel at DLA Piper as they discuss important rulings that may...more
It is safe to say that most of the world’s adult (and child) population owns or has access to a mobile phone. These devices are capturing all kinds of private and sensitive data—some of which is generated by the user, while...more
Whether a property damage loss involves vehicle impact, structural collapse, construction defect, equipment failure, fire or explosion, hail, lightning, storm, animal activity, or water, at some point the expert may need to...more
After collecting, analyzing the volume of data found on devices can be overwhelming. Attorneys and eDiscovery practitioners need the ability to gather insights across a variety of data sources, especially third-party...more
Each legal case or investigation has its own unique challenges, objectives, and goals. Experts must understand how to work with proven, advanced technologies to deliver a methodical and defensible data collection approach –...more
When it comes to a pending litigation, the duty to preserve electronic data is clearly laid out in the Federal Rules of Civil Procedure (FRCP)... But when it comes to the actual process of letting custodians know they need...more
One of the most important emerging questions in e-discovery concerns how courts should treat emails containing hyperlinks that reference other documents. Should such emails be produced with a familial relationship, akin to...more
In this two-part series, I interview Gordon J. Calhoun, Esq. of Lewis Brisbois Bisgaard & Smith LLP about his thoughts on the state of ediscovery within law firms today, including lessons learned and best practices to help...more
The March sessions of Legalweek took place recently, and as with the February sessions, the virtual event struck a chord that reverberated deep from within the heart of a (hopefully) receding pandemic. However, the...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
In 2003 Judge Shira Scheindlin wrote “once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a 'litigation hold' to ensure the preservation of...more
The volume of data stored as audio and video files has grown considerably in recent years. That growth has “mushroomed” in 2020, with so many meetings being conducted and recorded via Zoom and other web conferencing...more