No Password Required: From AOL to Award-Winning Cuisine to High-Stakes Hacking
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
How Startups Can Comply With Ever-Changing Privacy Laws
#Risk New York Speaker Series – Bridging the Gap: Effective Risk Communication in Compliance with Rob Clark, Jr.
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Innovation in Compliance: Real-Time Fraud Prevention Strategies for Financial Loss Prevention with Vince Walden
Rethinking Records Retention
#Risk New York Speaker Series: The Future of AI Governance in GRC with Matt Kelly
The Privacy Insider Podcast Episode 15: TAKE IT DOWN: Online Abuse and Harassment with Carrie Goldberg of C.A. Goldberg, PLLC
Facial Recognition and Legal Boundaries: The Clearview AI Case Study — Regulatory Oversight Podcast
AI on the Job: How to Stay Ahead of Employment and Data Privacy Risks
Podcast: Addressing Patient Complaints About Privacy Violations
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
State AG Pulse | Massive Google Settlement Shows AGs Serious About Privacy
Podcast - What Healthcare Providers Should Be Telling Students and Interns About HIPAA and Snooping
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — The Consumer Finance Podcast
Join ACEDS Chicago & Wisconsin Chapters CLE + Cubs/Brewers Tailgate and Baseball Game proudly sponsored by Lineal. Get ready for a fun-filled day of learning and entertainment. The CLE sessions will be held at Godfrey & Kahn...more
ComplexDiscovery Editor’s Note: This featured article from ComplexDiscovery OÜ provides an examination of one of the most compelling sessions from the 2025 Dublin Tech Summit, where AI transcended analytics and delved into...more
ComplexDiscovery Editor’s Note: Apple’s aggressive stance on privacy has earned both praise and penalty, most recently, a €150 million fine from the French Competition Authority. This significant enforcement action challenges...more
Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more
On January 7th, 2025, Meta announced they will be making major changes to content moderation policies on all their owned platforms, including Facebook: ending third-party fact-checking in the US in lieu of a new "Community...more
As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
While record retrieval may sound like a straightforward task, legal professionals know it’s a complex, time-consuming process involving multiple entities, layers of rules and regulations, and security concerns (which...more
ComplexDiscovery’s Editor’s Note: This recent €310 million fine imposed on LinkedIn by Ireland’s Data Protection Commission (DPC) marks a powerful moment in GDPR enforcement, underlining the regulatory rigor facing global...more
Are you overwhelmed by data mapping? Is it a daunting process for your privacy team? That's not surprising, and you are not alone. Conventional data mapping methods heavily rely on direct integrations, leading to unnecessary...more
One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more
The enactment of China’s Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law (PIPL, together with the CSL and the DSL, “Data Security Laws”) has significantly reshaped the landscape of...more
While the focus of artificial intelligence is on e-discovery, those managing privacy and cybersecurity initiatives must also adapt their practices to accommodate new expectations. This program will discuss best practices for...more
In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more
Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more
Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more
With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more
Every year, Exterro partners with the Association of Corporate Counsel (ACC) to conduct an in-depth survey of chief legal officers and general counsel at large US-based and international businesses to better understand their...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
In the past two years, the scope and volume of data that needs to be collected has evolved quicker than ever before. Corporations are continuously looking for the most effective and efficient ways to stay on top of the...more
All organizations are at different stages of cybersecurity risk management program development. These stages range from one end of the spectrum, where cybersecurity is not a consideration at all, to the opposite end where the...more
A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more
I'm still elated to see the return to in-person events - there is so much to share now that we're getting back together. Earlier this month, I returned to the stage at Legalweek to share ideas with the brilliant Linn Freedman...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
Corporate legal departments have seen some significant changes over the past couple of years. The ongoing explosion of data volumes and rapid adoption of new communications technologies have made e-discovery operations more...more