News & Analysis as of

Data Privacy Cybersecurity Electronically Stored Information

EDRM - Electronic Discovery Reference Model

French Competition Authority Fines Apple €150 Million Over ATT Framework and Market Dominance

ComplexDiscovery Editor’s Note: Apple’s aggressive stance on privacy has earned both praise and penalty, most recently, a €150 million fine from the French Competition Authority. This significant enforcement action challenges...more

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

Purpose Legal

Proactive Steps for Protecting your Intellectual Property (IP) and Trade Secrets

Purpose Legal on

We live in an era in which information is a valuable commodity. Access to data, ideas, and trade secrets is in high demand, particularly for individuals or companies seeking to profit from this information. One way they gain...more

Ankura

Ensuring Data Security and Confidentiality During E-Discovery

Ankura on

In the high-stakes world of legal due diligence, the security and confidentiality of sensitive information are paramount. With the increasing volume of electronically stored information (ESI) and the complexity of modern...more

Pagefreezer

How to Capture Evidence on Facebook – Before it Disappears

Pagefreezer on

On January 7th, 2025, Meta announced they will be making major changes to content moderation policies on all their owned platforms, including Facebook: ending third-party fact-checking in the US in lieu of a new "Community...more

Cimplifi

Going Mobile: Mobile Device Data in Criminal Investigations

Cimplifi on

While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more

Purpose Legal

The Role of Digital Forensics Expert Witnesses

Purpose Legal on

In the digital age, the courtroom has evolved. It’s no longer just about physical evidence and eyewitness accounts. Today, digital evidence plays a crucial role in many legal proceedings. Enter the digital forensics expert...more

EDRM - Electronic Discovery Reference Model

Private LLMs vs. RAG Systems? Choosing the Right AI Strategy for Your Legal Organization

As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

U.S. Legal Support

Data Privacy Needs & Trends in Litigation Support

U.S. Legal Support on

One of the most important trends in our 2024 survey was the rising importance of data privacy in litigation support. Increased adoption of virtual legal technology and innovative technologies like Artificial Intelligence (AI)...more

EDRM - Electronic Discovery Reference Model

Implications of the €310 Million LinkedIn Fine for GDPR Compliance

ComplexDiscovery’s Editor’s Note: This recent €310 million fine imposed on LinkedIn by Ireland’s Data Protection Commission (DPC) marks a powerful moment in GDPR enforcement, underlining the regulatory rigor facing global...more

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Osano

It's Time to Think About Data Mapping Differently

Osano on

Are you overwhelmed by data mapping? Is it a daunting process for your privacy team? That's not surprising, and you are not alone. Conventional data mapping methods heavily rely on direct integrations, leading to unnecessary...more

Perkins Coie

Cybersecurity for Lawyers: A Series

Perkins Coie on

If you are an attorney covering cybersecurity, not only do you have to stay on top of ever-evolving legal obligations and risks, you have to be able to speak competently with your technical counterparts....more

EDRM - Electronic Discovery Reference Model

[Webinar] Unlocking the Power of ROPA: Why It Matters, Latest Privacy Trends, and How It Protects Your Business - August 20th,...

Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing emphasis on data transparency, it's essential to stay ahead...more

Association of Certified E-Discovery...

[Webinar] Stay ahead of the latest privacy trends: Unlocking the power of ROPA - September 10th, 10:00 am PDT

Why it matters and how it protects your business - Are you aware of the critical role Records of Processing Activities (ROPA) play in your privacy compliance strategy? With the rise in data breaches and an increasing...more

EDRM - Electronic Discovery Reference Model

[Webinar] How Legal Must Mitigate Risk in Today's Dangerous and Changing Data Landscape - May 23rd, 1:00 pm - 2:00 pm ET

One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more

WilmerHale

Navigating China’s Data Security Laws in US Discovery

WilmerHale on

The enactment of China’s Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law (PIPL, together with the CSL and the DSL, “Data Security Laws”) has significantly reshaped the landscape of...more

Association of Certified E-Discovery...

[Webinar] A Practical Approach to Adapting Your E-Discovery Skills for AI, Privacy, and Cybersecurity - May 17th, 2:00 pm ET

While the focus of artificial intelligence is on e-discovery, those managing privacy and cybersecurity initiatives must also adapt their practices to accommodate new expectations. This program will discuss best practices for...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 159 | Shawn Belovich of HaystackID sits down with Kaylee & Mary

In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more

Carlton Fields

No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns

Carlton Fields on

Dr. Diana Burley has nearly 30 years of experience leading digital transformations and driving cross-sector education, research, and strategic innovation. As American University’s chief research and innovation officer, she is...more

Husch Blackwell LLP

Avoiding the False Claims Act with Good Cyber Practices

Husch Blackwell LLP on

Since 2021, the Department of Justice (DOJ) has been increasingly focused on adjudicating False Claims Act (FCA) matters for deficient cybersecurity practices. As the government increases scrutiny of data privacy and...more

EDRM - Electronic Discovery Reference Model

Secure Design: A Matter of Responsibility and Diligence

Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

109 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide