Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Strategy Considerations for Global Litigation
In-house Roundhouse: Antitrust and the Tech Industry
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Episode #9 - Blockchain Basics with Trokt's Chris Draper
Compliance Perspectives: The Ethics of Data
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Compliance Perspectives: Regulatory Conflicts in Data Privacy Laws
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
E14: The Three Pillars of GDPR
Straight Talks: Data privacy and cybersecurity in the age of rolling smart devices
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
This article originally appeared on Solutions Review’s Insight Jam, an enterprise IT community enabling the human conversation on AI. For as long as there have been computers, we’ve heard the warning, “Garbage in – Garbage...more
Microsoft Teams is one of the most heavily used modern collaboration apps with 300 Million daily active users, a 30 million user increase in just the last 12 months. Teams stores relevant ESI for legal discovery, forensic...more
As U.S. regulators and enforcement authorities alike become increasingly focused on corporate oversight practices of their employees' use of third-party messaging applications, including ephemeral messaging, companies should...more
The increase in remote work changed the legal industry and how clients interact with vendors and their data. A significant amount of information has been moved from on-premises locations to private data centers in the cloud....more
With the ever-increasing growth of enterprise data, meeting compliance guidelines from regulatory bodies regarding digital files, communications, Personal Identifiable Information (PII), financial information, and financial...more
Thomas Friedman's 2005 book titled The World is Flat discussed how globalization and technology flatten barriers to entry, making the world more competitive. From 2005 to 2021, there is no shortage of examples to highlight...more
As the COVID-19 pandemic and social distancing enforced remote work only accelerated the move to the cloud for many organizations, it should come as no surprise that the use of cloud-based solutions continues to be on the...more
...Just when we were getting used to the idea of the California Consumer Privacy Act (CCPA), a new law was passed in November 2020, which will supercede it. Fortunately, there is time to prepare since the California Privacy...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
Storage infrastructure, along with computing and network infrastructures, represents one of the fundamental pillars of Information Technology (IT). Just like computing and networking, the storage infrastructure landscape is...more
Every organization needs to develop an effective data retention policy to gain visibility and control over its information. But given the increasing complexity of today’s data systems and the constantly evolving regulatory...more
After undergoing several rounds of revisions to the 2019 draft specifications, the new Information Security Technology-Personal Information Security Specifications (GB/T35273-2020) (New Personal Information Specifications)...more
Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more
Digital tools such as mobile apps with warning and tracing functionalities that identify contacts of confirmed COVID-19 infections are said to be crucial for alerting users to the risk of infection and helping to interrupt...more