News & Analysis as of

Electronically Stored Information Data Collection Privacy Concerns

EDRM - Electronic Discovery Reference Model

“It Ends With Us”

In Lively v. Wayfarer Studios LLC, 2025 WL 662896 (S.D.N.Y. Feb. 28, 2025), the court granted in part and denied in part a motion to quash subpoenas issued to AT&T, Verizon, and T-Mobile (the “Wayfarer Parties”) by Ms. Blake...more

HaystackID

[Webcast Transcript] Remote Security for Distributed Workforces: Review Challenges and Considerations

HaystackID on

Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more

Hanzo

Looking Back, Moving Forward: Hanzo's 2018 Review and 2019 Predictions

Hanzo on

With 2018 in the archives, Hanzo is starting off the new year with a look ahead to the trends and challenges we believe will define the compliance and eDiscovery landscape in 2019, and a look back at the year that was at...more

Bracewell LLP

CLOUD Act Aims for Clear Skies: Bipartisan CLOUD Act Seeks to Clarify Law Enforcement Access to Overseas Data

Bracewell LLP on

In October 2017, the Supreme Court granted the Department of Justice’s petition to review the Second Circuit’s decision that limits the reach of warrants issued under the Stored Communications Act (“SCA”). Specifically, the...more

Proskauer - Minding Your Business

Privacy vs. Security: Will SCOTUS Leave the (Third) Party in 2018?

If the government obtains information about your past locations from your wireless provider, is that a search? If so, is it a search that requires the government to obtain a warrant? Courts have held that, because companies...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #3

Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide