News & Analysis as of

Forensic Examination Investigations

EDRM - Electronic Discovery Reference Model

Building a Unified Foundation for Digital Investigations in eDiscovery

The digital forensics landscape in the private sector is witnessing a metamorphosis. The relentless growth and diversification of data necessitates a paradigm shift in how organizations approach investigations. Fragmented...more

Troutman Pepper

Does Every Incident Require a Forensic Report? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

Association of Certified E-Discovery...

How Not to Prevent an Effective Forensics Investigation

For eDiscovery and digital forensics experts, there are some frequently occurring actions we’ve seen that can hamper our ability to perform thorough and effective forensics investigations. This blog is designed to give a...more

Epiq

Blockchain Considerations for Litigation and Investigations

Epiq on

More organizations continue to adopt blockchain technologies. According to Grand View Research, the global blockchain technology market value was estimated at 10.02 billion in 2022. Analysts forecast a compound annual growth...more

StoneTurn

Leveraging Integrity Monitors to Safeguard Corporate Resources

StoneTurn on

Corporate entities have significant responsibilities in managing and allocating resources effectively. The need to ensure proper use of funds for critical development and construction projects, as well as other large-scale...more

EDRM - Electronic Discovery Reference Model

Revocation of Consent to Search Mirror Image of Laptop

In State v. McDonnell, __ Md. __,  2023 WL 4393297, at *1 (July 7, 2023), the Supreme Court of Maryland held that a person who had consented to seizure of his laptop, as well as to creation of a mirror image, could withdraw...more

J.S. Held

Advanced Technology in Forensic Engineering: 3D Scanning, HD Drones, Video Analysis, and Berla iVe Vehicle System Forensics

J.S. Held on

Forensic technology is moving forward at a rapid pace. Americans are bombarded by high tech forensics in every TV show or movie they watch. From CSI to MacGyver, investigators solve their cases and problems with innovative...more

HaystackID

[Webcast Transcript] Data Forensic Investigations Exploitation by Concept Searching

HaystackID on

Editor’s Note: On February 16, 2022, HaystackID shared an educational webcast designed to present and explore the foundations of analytics and highlight workflows, methods, and applications that can be leveraged in compliance...more

Patterson Belknap Webb & Tyler LLP

Forensic Analysis and Privilege in the Wake of a Data Breach

In the wake of a data breach, counsel will often require the assistance of a forensic firm in order to provide legal advice to their client. The forensic analysis—which is often memorialized in a report to counsel—is crucial...more

Alston & Bird

Potential Solutions for Maintaining Attorney-Client Privilege and Work Product Protections over Forensic Reports in Light of...

Alston & Bird on

Our Privacy, Cyber & Data Strategy Team delves into how a federal court decided that a data breach forensic report was discoverable despite efforts to protect it under attorney-client privilege and work product protections...more

TransPerfect Legal

Three Keys to Successfully Executing a Trade Secrets Investigation

TransPerfect Legal on

In late March, our Research and Operations team looked into practice areas that will not only continue at the same pace during the pandemic, but potentially thrive. One of these was trade secret matters, which our research...more

Butler Weihmuller Katz Craig LLP

SUBRO SENSE PODCAST - Forensic Investigation of Subrogation Claims During COVID-19

Like all other aspects of life, the forensic investigations of existing and new subrogation claims has been significantly impacted by the COVID-19 pandemic. Senior Mechanical Engineer and Certified Fire Investigator, C....more

Seyfarth Shaw LLP

Conducting Trade Secret and Restrictive Covenant Investigations Remotely

Seyfarth Shaw LLP on

One of the first things a company should do when it suspects that its trade secrets have been compromised or that an employee has violated post-employment restrictive covenants is to conduct an investigation. ...more

Troutman Pepper

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide