News & Analysis as of

Electronically Stored Information Data Protection Today's Popular Updates

Hanzo

Chat eDiscovery, Reimagined: Why Gen AI is the Smarter Way to Handle Chat Data

Hanzo on

Imagine searching for a crucial conversation in a sea of endless chat messages—messages filled with greetings, status updates, and casual banter. The reality of modern enterprise communication is an overwhelming flood of...more

Axinn, Veltrop & Harkrider LLP

Who’s Blocking Me? Competition Law Issues With Healthcare Information Blocking

This week on the American Bar Association’s Our Curious Amalgam podcast, co-hosts Jeny Maier, Managing Partner at Axinn, Veltrop & Harkrider, and Matt Tabas, Antitrust & Competition Partner at Arnold & Porter, are joined by...more

Fox Rothschild LLP

Preparing for a TikTok Ban: What Employers Should Do to Ensure Access to Crucial Information Before It Disappears

Fox Rothschild LLP on

In recent years, TikTok has become a widely used platform for communication and content sharing, boasting nearly 2 billion users globally and 170 million active users in the U.S. alone. And while other social media platforms...more

EDRM - Electronic Discovery Reference Model

The Future of AI Is Here—But Are You Ready? Learn the OECD’s Blueprint for Ethical AI

The future of Artificial Intelligence isn’t just on the horizon—it’s already transforming industries and reshaping how businesses operate. But with this rapid evolution comes new challenges. Ethical concerns, privacy risks,...more

The Volkov Law Group

Google’s Failure to Preserve Electronic Communications — A Warning to Every Company of a New Reality Surrounding Electronic Data

The Volkov Law Group on

One thing you can count on — change.  Not that there is anything wrong with that, but not to be too dramatic, we are at the precipice of some significant technology trends that will have a profound impact on corporate...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - V 4, Issue 4, April 2023

Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more

EDRM - Electronic Discovery Reference Model

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

EDRM - Electronic Discovery Reference Model

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

TransPerfect Legal

Changing the Automotive Narrative: Hacking Concerns & Wireless Communication Interfaces

TransPerfect Legal on

The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more

Reveal

Identifying and Protecting Data Within Your Organization is a Moving Target

Reveal on

Organizations have a lot to contend with regarding their data these days. Data is more sensitive than ever, due to ever-changing data privacy laws. Yet, it’s also under siege more than ever with an increasing number of...more

Association of Certified E-Discovery...

[Webinar] Data Privacy for eDiscovery Pros: Strategy and Execution - March 17th, 1:00 pm - 2:00 pm EDT

This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more

Association of Certified E-Discovery...

[Webinar] Data Breach Response -- Technologies, Techniques and Technicalities - February 17th, 1:00 pm - 2:00 pm EST

The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more

Reveal

Be Aware, Be Very Aware – of Cybersecurity Awareness Month!

Reveal on

Tomorrow is October 1st, and the end of the month is Halloween. So, the phrase “be afraid, be very afraid” (a tagline* which came from the 1986 movie The Fly) seems very appropriate for the end of October. But the phrase “be...more

Reveal

Healthcare Organizations Must Deal with their Shadow Information Problem

Reveal on

A myopic focus on protecting EMR (Electronic Medical Records) systems has left healthcare organizations open to shadow information risk. In a world where hackers and ransomware criminals are regularly compromising healthcare...more

Reveal

There Are More Challenges in Managing Discovery in Healthcare Than You Probably Realize

Reveal on

A few months ago on this blog, I wrote about using Artificial Intelligence (AI) to keep up with the “alphabet soup” of compliance. An important area to address from a compliance standpoint is health data and at least two of...more

Association of Certified E-Discovery...

Data Protection and Cybersecurity Today

Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more

Association of Certified E-Discovery...

[Webinar] Dealing with the Growing Risks of the ‘Shadow IT’ Environment - August 11th, 1:00 pm - 2:00 pm BST

The ever-expanding information technology environment is one of the biggest challenges for IT, e-discovery and digital forensics practitioners today. It takes just seconds for anyone to open a webpage and download a new tool...more

Reveal

Hackers Will Not Only Take Your Money, They Could Also Take Your Patients’ Lives

Reveal on

Go to just about any news site today and there is probably a new story about a data breach that costs a company millions of dollars. Just in the past few weeks, we’ve seen Colonial Pipeline pay as much as $5 million in...more

Fisher Phillips

One Year Later: How the Evolving Work-from-Home Climate Prompts Reminders for Technology Best Practices

Fisher Phillips on

Perhaps no COVID-19 phenomenon will have a more lasting impact than the virtual office. Many employers recently marked the first anniversary of the decision to ask their employees to work from home in an effort to combat the...more

Association of Certified E-Discovery...

[Webinar] Risky Business – Protecting Your Data From Hackers? - April 21st, 11:30 am - 1:00 pm CDT

It’s hard to read the news these days without hearing about another major breach. No one is immune to these attacks including government, social media, law firms, dating websites, credit reporting agencies, and even our...more

Lighthouse

AI and Analytics: New Ways to Guard Personal Information

Lighthouse on

Big data can mean big problems in the ediscovery and compliance world – and those problems can be exponentially more complicated when personal data is involved. Sifting through terabytes of data to ensure that all personal...more

Oberheiden P.C.

5 Keys to Picking the Best Digital Forensics Company

Oberheiden P.C. on

From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Association of Certified E-Discovery...

[Webinar] How To Prepare for Cybersecurity and Respond to a Data Breach - November 19th, 12:00 pm - 1:00 pm CT

Consilio, SecureIT360 and Polsinelli will take a deep dive into responding to a cyber-attack and data breach. Learn about what to expect when you arrive on the scene following a cyber incident, and best practices for what...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

40 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide