News & Analysis as of

Data Protection Data Security Attorney-Client Privilege

Venable LLP

Communicating in a Crisis: Tips for Protecting Communications When It Matters Most

Venable LLP on

As recent high-profile litigation, government investigations, and large-scale data-security incidents have shown, organizations are often thrust into crisis mode, requiring rapid responses and close collaboration with third...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law. - September 28th, 2:00 pm - 3:00 pm BST

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law - September 13th, 1:00 pm - 2:00 pm ET

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

Epiq

Why no Organization Should be without a Cyber Attorney

Epiq on

Cybersecurity is a top concern for organizations of all shapes and sizes. Whether it be a global organization or a small business, each will inevitably collect and store consumer data that hackers could attempt to steal....more

Epiq

CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)

Epiq on

Jerich Beason is joined by Erik Weinick. Erik's experience includes privacy, cybersecurity, bankruptcy, commercial torts, defamation/slander, regulatory to name a few. He is also the co-founder of Otterburg’s Privacy &...more

Poyner Spruill LLP

Court Compels Discovery of Cyber Expert Report in Litigation

Poyner Spruill LLP on

A federal court has held that neither the work product nor attorney-client privilege doctrines shield a cyber expert’s report from discovery....more

Kelley Drye & Warren LLP

Lessons Learned for Maintaining Attorney-Client Privileged Data Breach Investigation (and other Consultant) Reports

Following a data breach, companies generally launch an investigation to determine the source and scope of the breach. These efforts are often led by in-house privacy, compliance, and/or litigation counsel with an eye firmly...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - May 2017

In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more

Alston & Bird

Six Myths of Breach Response

Alston & Bird on

Data breach has, unfortunately, become a fact of life. Practically every corporation has experienced some sort of security incident, although most have avoided (to their knowledge) significant network intrusions and loss or...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide