FCPA Compliance Report: AI, Data Compliance, and Ownership - A Conversation with Andrew Hopkins
A Less is More Strategy for Data Risk Mitigation
Weathering the 2025 Whirlwind: How to Keep Calm & Carry On
Approach to Responsible AI
Why Privacy Matters to Your Business and What's in Store for 2025
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
Getting Bang for Your Buck: Spend Your 2025 Privacy Budget Wisely
Constangy Clips Ep. 7- 4 New Year’s Resolutions to Keep Your Cyber Data Safe and Secure in 2025
The Privacy Insider Podcast Episode 10: 2025 Privacy Predictions: Hold My Beer, 2024
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Protect, Prepare, Prevail: Navigating a Complex Cybersecurity World
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Crafting an Effective Law Firm Generative AI Policy for Responsible Business Use: On Record PR
2025 Privacy Law Preview: Be Prepared
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
"Monsters Inc." y el tratamiento de los datos
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
AI Discrimination and Emerging Best Practices – Part 2 - The Good Bot Podcast
The Privacy Insider Podcast Ep. 8: Privacy Over Party: Peter Swire
Generative AI has been transforming the legal industry, assisting with everything from case law summarization to document review and legal research. But as its adoption accelerates, new legal questions are emerging: Should...more
Atlassian’s Jira and Confluence are powerful tools for collaboration, project management, and team alignment. However, when it comes to preserving and collecting data for legal or compliance purposes, they introduce unique...more
Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more
Is AI too expensive for document review? Read about the key issues raised in the current debates about the ROI of AI, including initial setup costs and quality control, and how you can assess the technology’s value for you....more
In recent years, TikTok has become a widely used platform for communication and content sharing, boasting nearly 2 billion users globally and 170 million active users in the U.S. alone. And while other social media platforms...more
As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more
DeepSeek’s Deep-Think feature takes a small but meaningful step toward building trust between users and AI. By displaying its reasoning process step by step, Deep-Think allows users to see how the AI forms its conclusions,...more
In the early days of first-generation AI models, legal industry technology providers did not frequently encounter the question, “Where do my models live?” The assumption has always been that the models live where the data...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
The construction industry faces unique challenges in eDiscovery, from managing vast data volumes to protecting sensitive communications and plans. HaystackID®’s upcoming webcast will explore practical and advanced artificial...more
When it comes to discovery of mobile devices, it’s not just the data that’s important for discovery, but also the data about the data – the metadata – that can be used to authenticate evidence, to determine whether the data...more
Don’t miss how easy it is to have Windows keep backups of folder contents, so you can always access the set of files that you had in a folder yesterday, a week ago, last year, or even 10 minutes ago....more
The Masters Conference’s final event for 2024 brought together legal, forensic, and information governance experts to discuss the evolving challenges in eDiscovery and data management. Hosted by King and Spalding in Atlanta,...more
ComplexDiscovery’s Editor’s Note: This recent €310 million fine imposed on LinkedIn by Ireland’s Data Protection Commission (DPC) marks a powerful moment in GDPR enforcement, underlining the regulatory rigor facing global...more
The future of Artificial Intelligence isn’t just on the horizon—it’s already transforming industries and reshaping how businesses operate. But with this rapid evolution comes new challenges. Ethical concerns, privacy risks,...more
On September 18th, I had the opportunity to attend The Masters Conference in Seattle, WA, for my second time, hosted by Perkins Coie. This year, I was struck by how much the technology landscape in eDiscovery has evolved,...more
The Sedona Conference (TSC) and its Working Group 6 on International Electronic Information Management, Discovery, and Disclosure recently published their Commentary on Proportionality in Cross-Border Discovery (Commentary)...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more
It’s no longer hype. Organizations are broadly looking to adopt Gen AI to drive productivity across their workforce. There’s also end-user demand to satisfy. People use Gen AI in their personal lives and want to use it...more
Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more
ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more
In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more
A recent conversation I had raised a new concern surrounding the use of Generative AI that is worth talking through. Will using Generative AI tools violate obligations surrounding the storage and review of documents...more