Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Organizations face mounting challenges when it comes to managing legacy data across outdated platforms while meeting evolving legal and compliance demands. In this two-part webinar based on an actual case study, we’ll explore...more
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
In today’s cloud-centric workplace, hyperlinked files are fast replacing traditional attachments in emails and other communications, providing greater collaboration and improved data hygiene. However, the dynamic nature of...more
Despite the many technological advances in the collection, processing, and review of electronically stored information, it remains vital to conduct custodial interviews focused on data identification to confer a litigation...more
The increasing role of mobile devices in eDiscovery is undeniable, with recent data showing that 97% of eDiscovery cases now involve mobile devices. As mobile data grows in complexity, legal teams are tasked with handling...more
Join industry experts from Array and Venio Systems for an in-depth look at Array on Demand's processing engine, powered by Venio technology. Discover how leading firms navigate complex data challenges with unmatched...more
Perkins Coie’s Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes only and is intended as an aid in understanding each...more
IT teams will want to contribute to the debate over the FCA’s proposed changes, which could introduce additional complexities and lead to major IT costs for firms....more
On October 2, 2024, the U.S. Food and Drug Administration (FDA) released guidance in a question and answer format regarding the use of electronic systems, electronic records, and electronic signatures in clinical...more
eDiscovery refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format. eDiscovery tools can also be...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Modern attachments, in Google Workspaces and Microsoft Office, have long posed significant challenges in eDiscovery. They are not actual files attached to an email or message but are links pointing to files stored elsewhere....more
As data volumes grow, the use of technology to make sense of it is increasing – especially within disputes and investigations where the key data is buried within thousands or millions of documents, emails, text messages,...more
Website privacy controls—in the form of banners and pop-ups asking visitors to agree to, or reject, a website’s use of cookies, pixels, and similar technologies used to track their behavior—are becoming ubiquitous. In the...more
In a recent blog post, the FTC again cautioned entities that hashing data does not make that data anonymous. Hashing is a process that takes a particular input, such as a phone number or email address, and uses a mathematical...more
Bill Gates has insider knowledge on the future of generative AI. He predicts there will be ‘two more turns of the crank’ on scaling, with the next ‘big frontier‘ being ‘metacognition.’ Gates describes ChatGPT’s metacognitive...more
In the ever-evolving world of eDiscovery, the types of data we collect, process, and review have expanded far beyond traditional documents. With the proliferation of short messages, geolocation data, social media posts,...more
The U.S. Court of Appeals for the Ninth Circuit issued an opinion in Zellmer v. Meta Platforms, Inc., on June 17, 2024, affirming dismissal of a putative class action filed under the Illinois Biometric Information Privacy...more
In every technology innovation cycle, there is a natural tendency to think that the newest innovation is the silver bullet for long-standing problems, almost magically. When AWS and Azure began to have meaningful market...more
As an eDiscovery software and services provider who has worked with hundreds of law firms, corporate legal and government teams over the past 20 years, we have learned ways to make the process of data collection for...more
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more
Did you know that nearly 1/3 of companies have been fined by courts or regulatory agencies because the organization couldn’t respond in time to requests for electronically stored information (ESI)?...more
On May 9, 2024, Governor Wes Moore signed into law the Maryland Online Data Privacy Act of 2024 (“MODPA”). MODPA will take effect on October 1, 2025, but will not apply to personal data processing activities occurring before...more
Minnesota becomes the latest state to move to pass legislation regulating the processing and controlling of personal data (HF 4757 / SF 4782). If signed into law by Governor Tim Walz, the Minnesota Consumer Data Privacy Act,...more