News & Analysis as of

Forensic Examination Information Technology Electronically Stored Information

J.S. Held

Utilizing Digital Forensics Expertise in Intellectual Property, Copyright & Trade Secret Matters

J.S. Held on

Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more

Purpose Legal

Behind the Screens: Running Forensic Investigations in the Information Age

Purpose Legal on

When Steve Davis was starting out as an investigator 30 years ago, forensics work required travel by, as he says, “planes, trains, and automobiles.” Forensic investigators lugged around pelican cases – sturdy,...more

J.S. Held

What Is Digital Forensics: Applications, Processes, and Real-World Scenarios

J.S. Held on

This paper will cover the application of digital forensics, the types of data digital forensics experts work with, the investigation process, and some example scenarios wherein digital forensics experts are called to help...more

TransPerfect Legal

Forensic Operations in a Remote Working World

TransPerfect Legal on

Over the past few years, there has been an increased interest in using remote capabilities to perform digital forensic functions. The interest until recently was primarily centered on controlling costs. However, in a time...more

Seyfarth Shaw LLP

Conducting Trade Secret and Restrictive Covenant Investigations Remotely

Seyfarth Shaw LLP on

One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

Hanzo

Getting to know Ben Robbins From LinkedIn

Hanzo on

A conversation about in-house ediscovery, technology, and working in Silicon Valley - What does an ediscovery, forensics, and information governance guru at a major social media company have to say about in-house...more

Morgan Lewis

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

Morgan Lewis on

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

8 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide