News & Analysis as of

Passwords e-Discovery

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Array

This Week in eDiscovery: The Need to Preserve Passwords, New Challenges Over Legal Hold Notices and Privilege

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of July 22-28. Here’s what’s...more

Nextpoint, Inc.

Tips for Moving Data to a New eDiscovery Platform

Nextpoint, Inc. on

Legal data migration in ediscovery can seem overwhelming, but a proper plan will keep the process simple. Here’s what you should keep in mind when moving data to a new ediscovery platform. Change is inevitable, and that...more

Foley & Lardner LLP

BYOD to E-Discovery: What Happens When Employees “Scan” and Send Chats of Company Documents Using Their Phones?

Foley & Lardner LLP on

We recently cautioned employers about their confidential information showing up in selfies posted online, but social media is not the only reason employees are taking photos at work. Picture this: An employee quickly...more

Array

How to Make Your eDiscovery Process More Secure

Array on

For those engaged in eDiscovery, protecting companies’ sensitive data is only increasing in importance. Each year, the odds that a company or its law firm will experience a data breach grow. According to the Identity...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide