News & Analysis as of

Email Laptop Computers

EDRM - Electronic Discovery Reference Model

[Webinar] Important eDiscovery Case Law Decisions for August 2023 - August 30th, 1:00 pm - 2:00 pm ET

It’s not a heat wave, it’s a wave of hot eDiscovery case law disputes! Our August 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a motion to compel a forensic examination...more

Linda Liu & Partners

China’s Security Assessment Measures for Outbound Data Transfers and Understanding on the Application Guidelines

Linda Liu & Partners on

The much-anticipated Security Assessment Measures for Outbound Data Transfers (hereinafter referred to as "the Measures") of China has already come into effect on September 1, 2022, and on the eve of the effective date, the...more

A&O Shearman

eDiscovery in investigations: emails, chat and laptops

A&O Shearman on

This is the second in a series of blog posts on how to make eDiscovery in investigations as effective and painless as possible. Last time we looked at some of the key decisions that need to be made on how to collect data...more

Morgan Lewis

Russian Competition Authority Develops Guidelines for Preinstallation of Domestic Software

Morgan Lewis on

Following adoption of the law on the preinstallation of Russian software on electronic devices in December 2019, the Russian Federal Antimonopoly Service (FAS) has developed draft guidelines to determine the types of...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 20, Number 1. Privacy Briefs: January 2020

Report on Patient Privacy 20, no. 1 (January 2020) - ? A cybersecurity breach temporarily halted cancer radiation treatment services at the Cancer Center of Hawaii on Oahu,[1] the center said. The center, which provides...more

Proskauer - Minding Your Business

First Department Finds Work-Product Protection Not Waived by Storage of Documents on Company Laptop

On June 6, 2017, the First Department had an opportunity to apply—and reaffirm—last month’s decision in Peerenboom v. Marvel Entm’t, LLC, where the Court held that use of a company email system for personal purposes “does...more

Orrick, Herrington & Sutcliffe LLP

When Employees Leave With Your Secrets

Recently I shared the podium with an FBI agent who was asked what frustrated him the most when trying to help businesses with trade secret theft. His answer was a surprise: they fire the guy too fast! He explained that when...more

Robinson+Cole Data Privacy + Security Insider

Encryption: What is it, Why do it!

Encryption is a basic term used to describe the act of encoding data, files, and digital communications such that only those with the cipher could read or understand the information.  Think back to the decoder ring you got in...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide