News & Analysis as of

Information Technology Electronically Stored Information Investigations

J.S. Held

Utilizing Digital Forensics Expertise in Intellectual Property, Copyright & Trade Secret Matters

J.S. Held on

Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more

TransPerfect Legal

Search Terms – Advice from the Experts

TransPerfect Legal on

As data volumes grow, the use of technology to make sense of it is increasing – especially within disputes and investigations where the key data is buried within thousands or millions of documents, emails, text messages,...more

Seyfarth Shaw LLP

Conducting Trade Secret and Restrictive Covenant Investigations Remotely

Seyfarth Shaw LLP on

One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more

Association of Certified E-Discovery...

[Webinar] Gain Efficiencies in Investigations Through Advanced Methods and Technologies - January 30th, 1:00 pm ET

Today’s data climate presents unique challenges and opportunities for legal professionals responsible for conducting investigations. As data volumes accelerate and new data types continue to emerge, traditional approaches to...more

Association of Certified E-Discovery...

[Webinar] Gain Efficiencies in Investigations Through Advanced Methods and Technologies - December 18th, 1:00 pm ET

Today’s data climate presents unique challenges and opportunities for legal professionals responsible for conducting investigations. As data volumes accelerate and new data types continue to emerge, traditional approaches to...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide