Features
The GDPR: Teeth, and Considerations for Corporate Legal Counsel and Discovery Teams
With the EU's General Data Protection Regulation (GDPR) set to take effect in May of 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.
Features
Where Is the Digital-Age Sweet Spot Between Business Growth and Data Security?
In this heady atmosphere, law firms risk succumbing to the temptation — indeed, the seeming necessity — to exploit to the hilt the Internet's huge upside — its massive growth and profit potential — while neglecting its huge downside: its immense threats to data security.
Features
New Data Types in the App Age
While the threat of "big data" has cast a shadow over IT and legal departments for several years, the real challenge can often be the variety. The authors believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.
Features
Future Shock? Uncertainty over Long-Term Effects of the FCC Privacy Rules Repeal
<b><i>The Repeal May Open Up ISPs to Future Legal Challenges on How and When They Can Sell Their Customer's Private Data</b></i><p>While the recent repeal of the Federal Communications Commissions' (FCC) broadband privacy rules have caused an uproar over what many may see as lagging federal data privacy protections, it does little to change how broadband ISPs handle their users' data.
Features
<b><i>Legal Tech: e-Discovery</b></i><br> <b><i>Solo v. United Parcel Services</b></i>: A Conversation About Proportionality
Three leading e-discovery industry thought-leaders recap some of the latest case-law and provide their takeaways.
Features
The Growing Convergence of Cyber-Related Crime and Suspicious Activity Reporting
Regulators and law enforcement are taking proactive steps to further leverage anti–money-laundering monitoring and reporting tools in their battle with cyber attacks and cyber crimes. In-house legal and compliance teams need to be fully versed in the latest FinCEN and bank regulatory guidance on cyber-related crimes and have the right professionals available to assist them with these matters.
Features
Using Computer Forensics to Investigate Employee Data Theft
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
Features
State of the Industry: e-Discovery and Cybersecurity
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Features
Information Governance: Law Firms' Cybersecurity Weak Spot
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Features
Survey Reflects Growth in How Corporations Manage and Protect Information
Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›
