News & Analysis as of

Electronically Stored Information Encryption Data Security

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

Association of Certified E-Discovery...

Kangaroo Court: Understanding Blockchain

As a thought experiment, imagine there was a base metal as scarce as gold but with the following properties: boring grey in color, not a good conductor of electricity, not particularly strong but not ductile or easily...more

Stange Law Firm, PC

New encrypted applications gaining prevelance

Stange Law Firm, PC on

In divorce and family law litigation, text, email and cell phone records are often important. In many cases, parties seek this evidence in discovery when it bears on relevant issues. Text, email and cell phone records can...more

ArentFox Schiff

FTC Reminds Auto Dealer Vendor to Slow Down & Consider Security

ArentFox Schiff on

The Federal Trade Commission (FTC) recently released updated data security guidance in connection with a proposed settlement with LightYear Dealer Technologies, LLC (dba DealerBuilt), a service provider for the auto dealer...more

Association of Certified E-Discovery...

Growing Business Use of “Chat Apps” Poses Information Risk for Corporate Legal Departments

A 2017 survey of business professionals worldwide found that the average business professional uses 9.4 software apps for work purposes. Nearly half of the respondents said they use apps that are not sanctioned by their...more

Womble Bond Dickinson

Is Your HIPAA Compliance Program Ready for the FTC?

Womble Bond Dickinson on

Everyone in healthcare knows that the next round of HIPAA audits is coming. Covered entities and business associates have long been advised to review and update their HIPAA security risk analyses, have business associate...more

Proskauer on Privacy

Connecticut Updates its Data Security Laws, Imposing Stringent New Requirements

Proskauer on Privacy on

On June 30, 2015, the Governor of Connecticut signed into law S.B. 949, “An Act Improving Data Security and Agency Effectiveness." The new law updates Connecticut’s data security laws, including by adding a 90-day hard...more

Arnall Golden Gregory LLP

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide