News & Analysis as of

Information Technology Today's Popular Updates Information Governance

EDRM - Electronic Discovery Reference Model

From Moscow to Pyongyang: Cyber Threats Revealed by Sandra Joyce at the Tallinn Digital Summit

ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more

Mayer Brown

New York State Department of Financial Services Issues Proposed Artificial Intelligence Circular Letter

Mayer Brown on

On January 17, 2024, the New York State Department of Financial Services (“NYSDFS”) released a proposed circular letter addressing the use of external consumer data and information sources (“ECDIS”) and artificial...more

Alston & Bird

What You Should Know About the EU Digital Operational Resilience Act

Alston & Bird on

The European Union’s (EU) new Digital Operational Resilience Act (DORA) will go into effect in January 2025. Our Privacy, Cyber & Data Strategy Team digs into DORA and discusses how the new law may impact businesses inside...more

Epiq

Moving Information Governance to the Driver’s Seat to Accelerate Cyber Breach Response

Epiq on

Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to build strategic approaches to...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

Osano

Establish Total Customer Trust with a Commitment to Data Privacy

Osano on

In the last few months alone, dozens of reported data breaches have already occurred.  From Twitter’s breach that leaked millions of user accounts to ChatGPT’s breach that exposed subscriber payment information, it can...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

Polsinelli

U.S. State Privacy Law Update

Polsinelli on

In 2023, new comprehensive data privacy laws come into effect in five states — California, Colorado, Connecticut, Utah, and Virginia. The California Privacy Rights Act of 2020 (CPRA) and the Virginia Consumer Data Protection...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - April 2022 #2

Robinson & Cole LLP on

CYBERSECURITY - State Department Establishes Bureau of Cyberspace and Digital Policy - The Department of State’s new Bureau of Cyberspace and Digital Policy (CDP) commenced operations on April 4, 2022. According to an...more

HaystackID

[Webcast Transcript] The Hierarchy of Technology-Assisted Review: From Active Learning to Optimal Results

HaystackID on

Editor’s Note: On March 16, 2022, HaystackID shared an educational webcast developed to highlight insight into the world of active learning (AL) workflows through a combination of proven experience, expert processes, and...more

Reveal

Protecting Healthcare Records These Days is Like a Game of “Whac-a-Mole”

Reveal on

You’ve probably either played the game “Whac-a-Mole” yourself as a kid, or you watched your kid play it, at a Chuck E. Cheese or another similar arcade. It’s a simple game with five holes in which moles pop up and a soft...more

HaystackID

[Webcast Transcript] Breaches, Responses, and Challenges: Cybersecurity Essentials That Every Lawyer Should Know

HaystackID on

Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more

HaystackID

[Webcast Transcript] Ransomware, Incident Response, and Cyber Discovery: History, Solutions, and AI Workflows

HaystackID on

Editor’s Note: On August 11, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more

Lighthouse

Navigating the Intersections of Data, Artificial Intelligence, and Privacy

Lighthouse on

While the U.S. is figuring out privacy laws at the state and federal level, artificial and augmented intelligence (AI) is evolving and becoming commonplace for businesses and consumers. These technologies are driving new...more

Esquire Deposition Solutions, LLC

Lawyers, Be Tough Customers When Purchasing Technology

Lawyers, ask yourselves:  Can I ethically connect my work laptop computer to an unsecured public Wi-Fi network? What data security measures are in place at the technology vendors that store and process my clients’...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Epiq

[Virtual Event] Executive Roundtable Series in Canada: Digital Transformation after COVID-19: Compliance, Security and the Cloud -...

Epiq on

Participate in thoughtful discussions with Epiq and Microsoft on challenges, learnings and best practices on privacy, risk and compliance. Epiq and Microsoft would like to personally invite you to join a 90-minute Risk &...more

Burr & Forman

Cyber Still Atop Exam Priorities

Burr & Forman on

FINRA held its bi-annual Cybersecurity Conference in January and recently published five take-away real-world experiences from the conference...more

Faegre Drinker Biddle & Reath LLP

Emerging Cyber-Security Threats for 2020: The Rise of Disruptionware and High-Impact Ransomware Attacks

Disruptionware is defined by the Institute for Critical Infrastructure Technology (ICIT) as a new and “emerging category of malware designed to suspend operations within a victim organization through the compromise of the...more

Littler

Brazil’s Data Protection Law: HR’s Perspective

Littler on

With less than a year remaining before Brazil's General Data Protection Law (referred to as the LGPD) takes effect, HR professionals should start preparing. Originally Published in of SHRM - January 2020....more

Robins Kaplan LLP

Financial Daily Dose 1.10.2020 | Top Story: Ransomware Attack on Travelex Sows Chaos Across Foreign Exchange Sector

Robins Kaplan LLP on

Hackers who targeted airport currency exchange mainstay Travelex in a ransomware attack on New Year’s Eve have alerted British media that they possess 5 GB of sensitive customer data from the company “since gaining access to...more

Stinson - Government Contracting Matters

DoD Issues Revised Draft Cyber Security Model Certification to Address Levels 1 Through 3

Previously we reported on the Department of Defense (‘DoD”) efforts to develop a Cybersecurity Maturity Model Certification (“CMMC”) program to verify the status of contractor cybersecurity and compliance. The CMMC program...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

24 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide