News & Analysis as of

Litigation Strategies Data Breach Attorney-Client Privilege

A&O Shearman

Medibank class action: navigating the legal privilege maze

A&O Shearman on

Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more

Mayer Brown

2024 Cyber Litigation Legal Update – What Your Business Needs To Know

Mayer Brown on

By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more

Jenner & Block

Privilege Newsletter: Fitting Consultants Within the Attorney-Client Privilege and Work Product Protection – Public Relations...

Jenner & Block on

In our last newsletter, we analyzed the reluctance of courts to apply privilege to the work of forensic computer consultants following data breaches. Here, we address often unavailing efforts to fit communications with...more

Jenner & Block

Privilege Newsletter: Fitting Consultants Within the Attorney-Client Privilege and Work Product Protection – Cyber Breach...

Jenner & Block on

Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more

Patterson Belknap Webb & Tyler LLP

Forensic Analysis and Privilege in the Wake of a Data Breach

In the wake of a data breach, counsel will often require the assistance of a forensic firm in order to provide legal advice to their client. The forensic analysis—which is often memorialized in a report to counsel—is crucial...more

Proskauer - Minding Your Business

Maintaining Privilege and Work Product Protections in Dual Purpose (Legal and Business) Investigations

Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide