Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
A Less is More Strategy for Data Risk Mitigation
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
[Webinar] AI and Data Privacy: Minimizing Risk and Maximizing Opportunity
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
The Great Link Debate and the Future of Cloud Collaboration
Data Driven Compliance - Malcolm Hawker and Fit for Purpose Data
Review Analytics for a New Era
Data Governance for the BYOD Age
With the publication of the updated NABITA Industry Standards for Behavioral Intervention Teams, it is crucial to emphasize the connection between standards, particularly standards 19 through 21, which address producing an...more
One of the goals that the Benelux Chapter of the Association for Certified eDiscovery Specialist (ACEDS) wants to achieve is to promote Legal Technology education. This leads to certification and further professionalization...more
DHS Warns Businesses of Risk of Iranian-Backed Wiper Malware Attacks - The tension with Iran has generally increased, and it has been reported that the U.S. has launched a cyber-attack against Iran. In retaliation, the risk...more