Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
How Startups Can Comply With Ever-Changing Privacy Laws
Privacy for Risk Management: Bridge the Business, Technology and Compliance Gaps
Rethinking Records Retention
#Risk New York Speaker Series: The Future of AI Governance in GRC with Matt Kelly
The Privacy Insider Podcast Episode 15: TAKE IT DOWN: Online Abuse and Harassment with Carrie Goldberg of C.A. Goldberg, PLLC
Facial Recognition and Legal Boundaries: The Clearview AI Case Study — Regulatory Oversight Podcast
AI on the Job: How to Stay Ahead of Employment and Data Privacy Risks
Podcast: Addressing Patient Complaints About Privacy Violations
Compliance and AI: Using AI for Data Loss Prevention Systems with Vinay Goel
Safeguarding Your Business Data
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — Regulatory Oversight Podcast
Constangy Clips Ep. 10 - 3 Ways the GDPR Is Evolving with Today’s Tech Landscape
The Privacy Insider Podcast Episode 14: The Pig Around the Corner: Privacy and Trade with Constantine Karbaliotis of nNovation LLP
State AG Pulse | Massive Google Settlement Shows AGs Serious About Privacy
Podcast - What Healthcare Providers Should Be Telling Students and Interns About HIPAA and Snooping
State AGs Unite: New Privacy Task Force Signals Shift in Regulatory Power Dynamics — The Consumer Finance Podcast
Innovation in Compliance: Navigating Regulatory Changes and Compliance in Trade and Data Privacy with Stephanie Font
Top Healthcare Compliance Priorities for 2025
AI Legislation: The Statewide Spotlight - Regulatory Oversight Podcast
Generative AI has been transforming the legal industry, assisting with everything from case law summarization to document review and legal research. But as its adoption accelerates, new legal questions are emerging: Should...more
Atlassian’s Jira and Confluence are powerful tools for collaboration, project management, and team alignment. However, when it comes to preserving and collecting data for legal or compliance purposes, they introduce unique...more
As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more
In the early days of first-generation AI models, legal industry technology providers did not frequently encounter the question, “Where do my models live?” The assumption has always been that the models live where the data...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
When it comes to discovery of mobile devices, it’s not just the data that’s important for discovery, but also the data about the data – the metadata – that can be used to authenticate evidence, to determine whether the data...more
ComplexDiscovery’s Editor’s Note: This recent €310 million fine imposed on LinkedIn by Ireland’s Data Protection Commission (DPC) marks a powerful moment in GDPR enforcement, underlining the regulatory rigor facing global...more
The Sedona Conference (TSC) and its Working Group 6 on International Electronic Information Management, Discovery, and Disclosure recently published their Commentary on Proportionality in Cross-Border Discovery (Commentary)...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more
Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more
In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more
When navigating the sea of data and terms of art in eDiscovery, it can feel a bit like you are wading through murky alphabet soup. Seriously, this industry sometimes feels a bit like it has gone overboard on the Acronyms!...more
Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more
Feeling seen, but maybe too seen - Stepping off the plane this past August after a long international flight, the last thing I wanted was a lengthy wait at US Customs, the final sentinel between me and a good night’s sleep. I...more
Hey there, cyber sleuths! TechnoCat, Cat Casey, here, ready to uncover some digital secrets! As we’ve chatted before, eDiscovery is the Sherlock Holmes of the digital age....more
Hey there, cyber sleuths! Your friendly neighborhood TechnoCat, Cat Casey, here to talk about a vital player in our eDiscovery game: PII, or Personally Identifiable Information. And folks, it’s not just about the usual...more
Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more
Although still at sea on an Atlantic crossing, I remain obsessed with the power of this new Ai tool. In the last blog we prompted a discussion by Chat-GPT with itself on the subject of AI and the future of the Law. Here we...more
With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
In civil litigation or regulatory inquiries, parties often must engage in electronic discovery, also known as eDiscovery, which is the process of identifying, preserving, collecting, reviewing, and producing electronically...more
As borders blur and businesses expand, many companies face accelerating challenges in data protection, privacy, and cross-border transfers. Dealing with each of these areas on its own can be daunting, and addressing each of...more
So far, our discussions about the AI legal revolution have revolved around the many ways artificial intelligence is helping to combat the unstructured data crisis looming over the legal industry. However, one area we’ve yet...more
Whether you’re a partner at a law firm, General Counsel at a Corporation, or a leader of legal services within a government agency, you can’t accomplish the goals of your legal team efficiently and effectively without...more
In case the complexities of corporate data weren’t creating enough turbulence to keep corporate and legal teams up at night, along comes a prolonged pandemic to really shake things up. Because now, a complex data landscape...more