Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Data Retention and Document Holds
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
eDiscovery Needs Digital Forensics for a Mobile World
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Record Retention and Information Governance
California Employment News: Synthesizing Evidence in a Workplace Investigation (Part 3)
A Look at the Metaverse’s Legal Implications, with Special Guest Samantha Green, Director of Content Marketing, Epiq
Evidence Preservation: Handling the Issues in New York and New Jersey
Keeping Up with M365 Software Updates
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: Remote Work - Increasing Communication on Collaboration Platforms
Video | Tips for Managing the Preservation of Mobile Device Data
While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more
In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more
The federal Cybersecurity and Infrastructure Security Agency (CISA) released a draft of its proposed rule detailing how covered entities operating in critical infrastructure sectors report cyberattacks and ransomware payments...more