News & Analysis as of

Privileged Communication Cybersecurity

BCLP

Banking Bites - May 2022 #2

BCLP on

Privy Council rules against extension of the Quincecare duty - Does a bank owe a duty of care to a person who is the beneficial owner of funds held in the account of a customer of the bank and who has been defrauded by...more

McDermott Will & Emery

[Webinar] That's All Folks! Have Federal Courts Killed Privilege Protections for Forensic Reports? - January 20th, 12:00 pm - 1:00...

McDermott Will & Emery on

Privacy Litigation Webinar Series Part 1 - Our Global Privacy & Cybersecurity team will be hosting a monthly webinar series on key issues and developments in privacy litigation. Confidentiality is a fundamental...more

Butler Snow LLP

What Lawyers Need to Know About Cybersecurity | Dennis Van Metre | Texas Appellate Law Podcast

Butler Snow LLP on

As technology becomes more sophisticated, so too do the security issues its users encounter. These challenges impact attorneys and law firms particularly, as they regularly deal with confidential data and privileged...more

Reveal

5 Best Practices For Protecting Sensitive Information During An Investigation

Reveal on

Organizations are feeling the pinch of compliance like never before as government agencies at every level are scrutinizing their business affairs more closely and issuing more regulations. To meet their compliance...more

Akin Gump Strauss Hauer & Feld LLP

Update: Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. In contrast to an earlier...more

Blake, Cassels & Graydon LLP

Cinq conseils pour protéger le secret professionnel en cas d’atteinte à la protection des données

Lorsque votre organisation est victime d’une cyberattaque ou d’une atteinte à la protection des données, la protection du secret professionnel devient vitale. À la suite d’une telle atteinte, les événements peuvent se...more

Blake, Cassels & Graydon LLP

Top Five Tips to Protect Privilege in a Data Breach

When your organization is addressing a cyber-attack or other data breach, protecting privilege is crucial. In the aftermath of a data breach, events can move very quickly. However, appropriate steps should be taken to ensure...more

Akin Gump Strauss Hauer & Feld LLP

Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

- In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. - In contrast to an...more

McDermott Will & Emery

[Event] Privacy & Cybersecurity Risk Management Series: Insights on Cybersecurity and Data Privacy - June 18th, New York, NY

McDermott Will & Emery on

Information is one of your company’s most valuable assets. It is critical to remain vigilant to protect against the latest cybersecurity threats and to comply with expansive privacy obligations. Join us in New York City for...more

Skadden, Arps, Slate, Meagher & Flom LLP

Cross-Border Investigations Update - January 2019

This issue of Skadden’s semiannual Cross-Border Investigations Update takes a close look at recent cases, regulatory activity and other key developments, including DOJ guidance on the use of corporate monitors in criminal...more

Skadden, Arps, Slate, Meagher & Flom LLP

Cross-Border Investigations Update

This issue of Skadden’s semiannual Cross-Border Investigations Update takes a close look at recent cases, regulatory activity and other key developments, including the use of legal holds in cross-border investigations,...more

Blake, Cassels & Graydon LLP

Viewpoint: Preserving Privilege over Communications in the Aftermath of a Data Breach

While there are no guarantees as to which communications will ultimately be protected by privilege, a company can increase its odds of creating a sphere of privilege-protected communications in the aftermath of a data breach...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide