Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Data Retention and Document Holds
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
eDiscovery Needs Digital Forensics for a Mobile World
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Record Retention and Information Governance
California Employment News: Synthesizing Evidence in a Workplace Investigation (Part 3)
A Look at the Metaverse’s Legal Implications, with Special Guest Samantha Green, Director of Content Marketing, Epiq
Evidence Preservation: Handling the Issues in New York and New Jersey
Keeping Up with M365 Software Updates
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: Remote Work - Increasing Communication on Collaboration Platforms
Video | Tips for Managing the Preservation of Mobile Device Data
On January 7th, 2025, Meta announced they will be making major changes to content moderation policies on all their owned platforms, including Facebook: ending third-party fact-checking in the US in lieu of a new "Community...more
On this episode, Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, founder of Reality Shift, chat with Dr. Anmol Agarwal, a senior security researcher at Nokia. With deep expertise in AI...more
We’re back with a deeper dive into the 2024 Data Security Incident Response Report, which features insights and metrics from 1,150+ incidents in 2023. This episode dives deeper into information governance and...more
While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more
In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more
One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more
The federal Cybersecurity and Infrastructure Security Agency (CISA) released a draft of its proposed rule detailing how covered entities operating in critical infrastructure sectors report cyberattacks and ransomware payments...more
2022 ushered in a number of changes in privacy laws, both in the United States and abroad. Those developments include emerging state legislation and increasing enforcement actions by state and federal authorities. The area of...more
Most people have heard of the Health Insurance Portability and Accountability Act (HIPAA), so it’s not surprising that companies dealing with digital health information will have to be HIPAA compliant. To do so, any protected...more
For the fourth year running, the Securities and Exchange Commission’s Office continues to list cybersecurity as one of the top enforcement priorities for 2019. As it relates to cybersecurity, the SEC will be focusing on...more
The Internet of Things (“IoT”) seems to impact every aspect of life. IoT generally refers to computing devices embedded in everyday objects that collect data. From thermostats to driver-assisted cars, innumerable devices...more