News & Analysis as of

Sensitive Personal Information e-Discovery

Array

This Week in eDiscovery: The Cost of Securing Sensitive Data, Responding to Discovery Issues

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of August 19-25. Here’s what’s...more

Array

This Week in eDiscovery: Discovery Requests of Private Email and Social Media Accounts, Plus, Microsoft Unveils “Air Gapped” LLM

Array on

Courts Rule for Private Email and Social Media Discovery - In two separate recent rulings, courts granted discovery related to private email accounts and private social media account usernames in requests made by...more

HaystackID

[Webcast Transcript] Getting Things Done with GAI

HaystackID on

Editor’s Note: During this webcast, industry leaders discussed using generative AI (GAI) in the legal and cybersecurity fields. The speakers, John Brewer, Anya Korolyov, Chris Wall, and Bernie Gabin, all experts in AI and...more

HaystackID

[Webcast Transcript] M365 for Law Firms and Lawyers: Purview Premium eDiscovery and Security, Capabilities and War Stories

HaystackID on

Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more

Nextpoint, Inc.

Don’t Let Redactions Cause Distractions: How to Properly Censor and Remove Information when Reviewing and Producing Documents

Nextpoint, Inc. on

Redacted legal documents can create a host of issues when not handled properly during document review. Here are some common redaction mistakes – and tips on how to avoid them....more

Array

How to Make Your eDiscovery Process More Secure

Array on

For those engaged in eDiscovery, protecting companies’ sensitive data is only increasing in importance. Each year, the odds that a company or its law firm will experience a data breach grow. According to the Identity...more

J.S. Held

Safeguarding Cloud-Based Data & Mitigating the Cyber Risks Associated with a Remote Workforce

J.S. Held on

Efficiency, scalability, speed, increased cost savings, and advanced security for highly sensitive data remain in high demand by users of eDiscovery services. To meet that demand, cloud technology promised several of those...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide