News & Analysis as of

Data Security Confidential Information Electronically Stored Information

EDRM - Electronic Discovery Reference Model

Enhancing Security in Law Firms: The Imperative of Multi-Factor Authentication

In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more

Association of Certified E-Discovery...

Both Sides of the Coin: Employment Separation from Two Perspectives

Employee separation commonly involves investigations, litigation, and eDiscovery. Many employees continue to access information from their employers after separation and almost ¾ of employers report that they’ve been...more

Fisher Phillips

AI Notetaking Tools Are All the Rage – But Should You Use Them? Employers Should Weigh These Risks First

Fisher Phillips on

Perhaps you’ve asked an employee to take notes during a Zoom meeting, but they complained the task is difficult to manage while collaborating with teammates. Maybe you intended to document everything that transpired during an...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law. - September 28th, 2:00 pm - 3:00 pm BST

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law - September 13th, 1:00 pm - 2:00 pm ET

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

CloudNine

6 Tips for Managing eDiscovery for Access Requests for a State or Local Government Organization

CloudNine on

By Catherine Ostheimer Being responsive to the growing number of Access Requests and DSARS as a local government organization can be daunting. First, there’s the data management challenge. State and local groups generate...more

Nextpoint, Inc.

Tips for Moving Data to a New eDiscovery Platform

Nextpoint, Inc. on

Legal data migration in ediscovery can seem overwhelming, but a proper plan will keep the process simple. Here’s what you should keep in mind when moving data to a new ediscovery platform. Change is inevitable, and that...more

HaystackID

[Webcast Transcript] Remote Security for Distributed Workforces: Review Challenges and Considerations

HaystackID on

Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more

Lighthouse

Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?

Lighthouse on

Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more

Baker Donelson

Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19

Baker Donelson on

Ian Campbell, the President and CEO of iCONECT, has a design background and, prior to founding iCONECT, he worked in advertising and founded his own agency. In 2012 iCONECT launched its flagship review product, Xera, which...more

Hinshaw & Culbertson - Lawyers' Lawyer...

The Lawyers' Lawyer Newsletter - Recent Developments in Risk Management - June/July 2020

Confidentiality – Electronically Stored Information – Unauthorized Access - The State Bar of California's Standing Committee on Professional Responsibility and Conduct Formal Opinion Interim 16-0002 - Risk Management...more

Seyfarth Shaw LLP

Conducting Trade Secret and Restrictive Covenant Investigations Remotely

Seyfarth Shaw LLP on

One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more

Fox Rothschild LLP

Tennessee District Court Deepens The “Without Authorization” Divide Under The Computer Fraud And Abuse Act

Fox Rothschild LLP on

A Tennessee District Court recently ruled in Wachter Inc. v. Cabling Innovations, LLC, 3:18-cv-00488 (W.D. Tenn. May 7, 2019) that two former employees with permitted access to company computers were not liable under the...more

Robinson+Cole Data Privacy + Security Insider

Employer Has No Legal Duty To Protect Employee Electronic Information

A court in Pennsylvania recently held that an employer does not have a legal duty to act reasonably in managing its computer systems to safeguard sensitive personal information collected from its employees, when the employer...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Searcy Denney Scarola Barnhart & Shipley

BYOD – Another reasonable basis for discovery about discovery

I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more

Ballard Spahr LLP

Ninth Circuit Vastly Expands Scope of Criminal, Civil Liability for Computer Fraud

Ballard Spahr LLP on

In a pair of highly anticipated decisions, the Ninth Circuit significantly reshaped criminal and civil liability under the federal Computer Fraud and Abuse Act (CFAA). The court’s recent decisions in United States v. Nosal...more

Morgan Lewis

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

Morgan Lewis on

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide