News & Analysis as of

Data Theft Data Collection

Troutman Pepper

Understanding Access vs. Acquisition - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

Each of the 50 states has its own definition of what constitutes a reportable data breach. For some, it requires “unauthorized access” to personal information. For others, it requires “unauthorized acquisition.” And then,...more

Association of Certified E-Discovery...

[Webinar] How to Ensure Departing Employees Don't Turn Into Insider Threats - May 18th, 1:00 pm - 2:00 pm EDT

Offboarding employees after they've resigned or been terminated is largely a routine process; they turn in their devices, which can then be imaged and archived. But are you routinely investigating their computer activity...more

Bradley Arant Boult Cummings LLP

Technology at a Price: Risks With Using Biometric Scanning in the Workplace - Labor & Employment Newsletter

Parents who took their children to Disney World in recent years may have been surprised when Disney “cast members” asked the young princes and princesses to place a finger on a scanner before entering the parks. Biometric...more

Seyfarth Shaw LLP

The Smartphone: A Treasure Trove of Evidence in Trade Secret Cases

Seyfarth Shaw LLP on

It’s hard to believe the first smartphone was released over 20 years ago. At that time, few thought it would become such an integral part of our lives. Additionally, this year marks the 10th anniversary of the iPhone and its...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide