News & Analysis as of

Discovery Data Security Data Privacy

EDRM - Electronic Discovery Reference Model

French Competition Authority Fines Apple €150 Million Over ATT Framework and Market Dominance

ComplexDiscovery Editor’s Note: Apple’s aggressive stance on privacy has earned both praise and penalty, most recently, a €150 million fine from the French Competition Authority. This significant enforcement action challenges...more

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

EDRM - Electronic Discovery Reference Model

New Battle of the Bots: ChatGPT 4.5 Challenges Reigning Champ ChatGPT 4o

Two AI heavyweights step into the ring: ChatGPT 4o, the reigning champion of fluency and speed, and the new challenger, ChatGPT 4.5, boasting an upgraded intellect and sharper wit. But which one is truly the best? To find...more

EDRM - Electronic Discovery Reference Model

Breaking New Ground: Evaluating the Top AI Reasoning Models of 2025

The year 2025 has brought us closer than ever to the dawn of artificial general intelligence, with AI systems now capable of reasoning on par with humans—or even surpassing them in specific domains. In this article, I examine...more

Minerva26

Requesting Cloud Data from Third Parties? Here’s What Every Litigator Needs to Know About the SCA

Minerva26 on

The way we communicate has changed dramatically in recent years, with businesses and individuals moving from traditional email to cloud-based collaboration platforms like Microsoft Teams, Slack, WhatsApp, Skype, and Telegram....more

Hanzo

The complexity of Jira and Confluence data in eDiscovery—and how to tackle it

Hanzo on

Atlassian’s Jira and Confluence are powerful tools for collaboration, project management, and team alignment. However, when it comes to preserving and collecting data for legal or compliance purposes, they introduce unique...more

EDRM - Electronic Discovery Reference Model

Private LLMs vs. RAG Systems? Choosing the Right AI Strategy for Your Legal Organization

As law firms and legal departments race to leverage artificial intelligence for competitive advantage, many are contemplating the development of private Large Language Models (LLMs) trained on their work product. While the...more

Epiq

How To Deploy LLMs Part 1: Where Do Your Models Live?

Epiq on

In the early days of first-generation AI models, legal industry technology providers did not frequently encounter the question, “Where do my models live?”   The assumption has always been that the models live where the data...more

Association of Certified E-Discovery...

Generative AI in Law: Understanding the Latest Professional Guidelines

The integration of artificial intelligence (“AI”) into legal practice is no longer a future prospect. It’s a reality that many attorneys are facing today. As law firms and legal departments begin to adopt AI tools to enhance...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

EDRM - Electronic Discovery Reference Model

Key AI Leaders of 2024: Huang, Amodei, Kurzweil, Altman, and Nobel Prize Winners – Hassabis and Hinton

Introduction - The year 2024 marked a pivotal time in artificial intelligence, where aspirations transformed into concrete achievements, cautions became more urgent, and the distinction between human and machine began to...more

EDRM - Electronic Discovery Reference Model

Small Language Models: A Paradigm Shift in AI for Data Security and Privacy

ComplexDiscovery Editor’s Note: As data security and privacy become increasingly crucial, small language models (SLMs) are emerging as essential tools for businesses and the public sector. Upstage Co. Ltd., an AI startup, is...more

EDRM - Electronic Discovery Reference Model

Optimizing the Remote Reach: Strategies for Secure and Efficient Data Collection

The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more

WilmerHale

Navigating China’s Data Security Laws in US Discovery

WilmerHale on

The enactment of China’s Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law (PIPL, together with the CSL and the DSL, “Data Security Laws”) has significantly reshaped the landscape of...more

EDRM - Electronic Discovery Reference Model

Secure Design: A Matter of Responsibility and Diligence

Cybersecurity is one of the biggest challenges facing contemporary society. With the advancement of digital technologies and the ever-increasing dependence on information systems to perform the most diverse activities, the...more

Fisher Phillips

AI Notetaking Tools Are All the Rage – But Should You Use Them? Employers Should Weigh These Risks First

Fisher Phillips on

Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more

Association of Certified E-Discovery...

[Webinar] Legal Hold Made Easy: Building a Defensible Litigation Workflow - September 21st, 1:00 pm - 2:00 pm EDT

Join us for a transformative webinar, "Legal Hold Made Easy: Building a Defensible Litigation Workflow," where we'll unravel the power of automated legal hold software to simplify and strengthen your litigation process. ...more

Association of Certified E-Discovery...

Technocat Tidbits: How to Manage PII in eDiscovery

Hey there, cyber sleuths! TechnoCat, Cat Casey, here, ready to uncover some digital secrets! As we’ve chatted before, eDiscovery is the Sherlock Holmes of the digital age....more

Association of Certified E-Discovery...

Technocat TidBits: What is PII?

Hey there, cyber sleuths! Your friendly neighborhood TechnoCat, Cat Casey, here to talk about a vital player in our eDiscovery game: PII, or Personally Identifiable Information. And folks, it’s not just about the usual...more

Onna Technologies, Inc.

The best data retention policy template to get you started (Updated)

Editor’s note: This post was originally published in October 2020 and has been updated for accuracy and comprehensiveness. They say more is better. And that’s true in many cases, but not when we’re talking about a stockpile...more

CloudNine

Key Takeaways on eDiscovery/eDisclosure, Info Governance and Collaboration from The Master’s Conference in London

CloudNine on

Exceeding Corporate Client Expectations - The first session of the conference, moderated by Richard Clark from CloudNine, focused on introducing new ways of deepening the relationship between corporate in-house and outside...more

Association of Certified E-Discovery...

[Webinar] From Chaos to Control: How Information Governance Transforms eDiscovery - June 13th, 1:00 pm - 2:00 pm EDT

Legal professionals often play a crucial role in advising organizations on information governance matters, particularly when it relates to legal and regulatory compliance, data privacy, and risk management. They may provide...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

Association of Certified E-Discovery...

Cyber Incident Response and eDiscovery Are Not One in the Same: Understanding the Key Differences and Associated Risks

With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

67 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide