Data Retention and Document Holds
Trial by Tech: The Evolution of the Digital Courtroom – Speaking of Litigation Video Podcast
Information Security and ISO 27001
No Password Required: LIVE From Sunshine Cyber Con
Calculating eDiscovery Costs: Tips from Brett Burney
No Password Required: President at Constellation Cyber, Former FBI Translator, and Finder of Non-Magical Mushrooms
Managing Large Scale Review Efficiency: Tips From a GC
DE Under 3: US DOL Inspector General’s Office Report Cites IT Modernization & Security Concerns
RegFi Episode 8: The Technological Path to Outcomes-Based Regulation with Matt Van Buskirk
Podcast: Discussing Information Blocking with Eddie Williams
The Data Center Cooling Conundrum With Leland Sparks - TAG Infrastructure Talks Podcast
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Everything Dynamic Everywhere: Managing a More Collaborative Microsoft 365
Law Firm ILN-telligence Podcast | Episode 62: Pierre Hurt, Lutgen & Associes | Luxembourg
ATL1, Atlanta Infrastructure and More With Brandon Peccoralo of Databank - TAG Infrastructure Talks Podcast
Expanded Information Block Rules Go into Effect
5 Key Takeaways | Current Perspectives Around the Convergence of Life Sciences and IT
No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team
Changing Hands: Keys To Downstream M&A IT Integration
Mia Reini and Monica Lopez Reinmiller on a Risk-Based Approach to Managing Employee Hotlines
Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more
The increasing role of mobile devices in eDiscovery is undeniable, with recent data showing that 97% of eDiscovery cases now involve mobile devices. As mobile data grows in complexity, legal teams are tasked with handling...more
When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more
One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more
This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more
Much like high school teachers across the country, Congress and the Executive Branch have been expressing security concerns about TikTok and its parent company, ByteDance, a Chinese software firm. These concerns led to the No...more
On Monday, July 24, 2023, Apple issued a security update to address vulnerabilities that have been linked to a spyware campaign. iOS 16.6 fixes 25 iPhone security flaws, several of which are being exploited by threat actors...more
On June 2, 2023, the FAR Council issued an Interim Rule to implement the prohibition on having or using TikTok or any successor application or service developed or provided by ByteDance Limited (covered application)....more
The Department of Defense, General Services Administration, and NASA have issued a new interim rule, FAR 52.204–27, implementing Section 102 of Division R of the Consolidated Appropriations Act, 2023 (Pub. L. 117–328), the...more
You may have learned of a new FAR provision banning the use of TikTok by contractors and employees. Lawmakers and regulators are concerned that TikTok and its parent company, ByteDance, may put sensitive user data into the...more
Holland & Knight previously noted an Office of Management and Budget (OMB) memorandum prohibiting the use of TikTok on information technology used by federal agencies and contractors. (See Holland & Knight's previous blog...more
On June 2, 2023, the Civilian Agency Acquisition Council and the Defense Acquisition Regulations Council issued an interim rule to implement a new statutory requirement that, in short, bans the TikTok app from devices used in...more
Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more
On February 28, the White House issued a memorandum giving federal employees 30 days to remove the TikTok application from any government devices. This memo is the result of an act passed by Congress that requires the removal...more
Apple recently announced it will be releasing its new mobile operating system, iOS 16, on September 12. The update will be available to iPhone 8 devices and newer. Although the new operating system will include some of the...more
While smart toys can certainly be useful educational tools for children, they also present some potential privacy risks and could invade what is traditionally a private space. Think about it—the thought of your child’s toy...more
Following the UK Government's announcement in January 2020 that it would be moving forwards with regulation on consumer IoT device security, the Government has now published its legislative proposals and is seeking feedback...more
Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more
UK Government set to move forwards with regulation on consumer IoT device security The UK Government has just announced that it intends to draw up legislation aimed at ensuring that all consumer smart devices sold in the UK...more
California has another privacy law that took effect on January 1, 2020 and it’s not the California Consumer Privacy Act (CCPA). This privacy law regulates Internet of Things (IoT) connected devices. SB 327 was enacted in 2018...more
Holiday shopping is in full gear and everything seems to be an Internet of Things (IoT) device. It continues to amaze me how folks will buy IoT gadgets and plop them in their homes and have no idea that they include a speaker...more
In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In Part 2, we turned to the types of information you can expect to encounter with mobile devices and key considerations for...more
While we have been talking about the very important message of educating employees about data security, I find that giving employees tips about their personal data security keeps them interested and engaged during education...more
Late last month, California Governor Jerry Brown signed the first US Internet of Things (IoT) cybersecurity legislation: Senate Bill 327 and Assembly Bill 1906. ...more
The Singapore summit was the focus of news stories this week. The media descended on Singapore to capture all of the news. When journalists started posting pictures of the contents of the gift bags that they were given at the...more