News & Analysis as of

Forensic Examination Today's Popular Updates

Warner Norcross + Judd

A Note of Caution: Data Breach Reports May be Discoverable

Warner Norcross + Judd on

An organization that has suffered a data breach likely does not want to have to disclose potentially embarrassing or harmful information, especially in a lawsuit resulting from the breach. Simply involving an attorney in...more

HaystackID

[Webcast Transcript] Data Forensic Investigations Exploitation by Concept Searching

HaystackID on

Editor’s Note: On February 16, 2022, HaystackID shared an educational webcast designed to present and explore the foundations of analytics and highlight workflows, methods, and applications that can be leveraged in compliance...more

Akin Gump Strauss Hauer & Feld LLP

Update: Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. In contrast to an earlier...more

Akin Gump Strauss Hauer & Feld LLP

Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

- In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. - In contrast to an...more

Hogan Lovells

Cyber Investigations and Privilege: Court Finds Forensic Report not Covered by Work Product Doctrine

Hogan Lovells on

Last week, the U.S. District Court for the Eastern District of Virginia ordered Capital One to produce a forensic investigation report in multidistrict litigation arising out of the cyber incident Capital One announced in...more

Robinson+Cole Data Privacy + Security Insider

Capital One Required to Produce Forensic Report in Class Action

As a litigator, when responding to any security incident, thoughtful consideration is given to the possibility that the security incident may wind up in litigation, and therefore, certain decisions are made in anticipation of...more

Troutman Pepper

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

Jackson Lewis P.C.

Court Rejects Overly Broad Request For Forensic Imaging Of Plaintiff’s Personal Computers

Jackson Lewis P.C. on

An Illinois appellate court has vacated a trial court’s order compelling the forensic imaging of several personal computers used by plaintiff, applying a balancing test that takes into account both the proportionality rule...more

Morgan Lewis

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

Morgan Lewis on

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide