While the threat of "big data" has cast a shadow over IT and legal departments for several years, the real challenge can often be the variety. The authors believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.
- May 02, 2017Tim Anderson and JR Jenkins
The Repeal May Open Up ISPs to Future Legal Challenges on How and When They Can Sell Their Customer's Private Data
While the recent repeal of the Federal Communications Commissions' (FCC) broadband privacy rules have caused an uproar over what many may see as lagging federal data privacy protections, it does little to change how broadband ISPs handle their users' data.
May 02, 2017Rhys DipshanThree leading e-discovery industry thought-leaders recap some of the latest case-law and provide their takeaways.
May 02, 2017Mike HamiltonRegulators and law enforcement are taking proactive steps to further leverage anti–money-laundering monitoring and reporting tools in their battle with cyber attacks and cyber crimes. In-house legal and compliance teams need to be fully versed in the latest FinCEN and bank regulatory guidance on cyber-related crimes and have the right professionals available to assist them with these matters.
May 01, 2017Marjorie J. Peerce and Kevin LeitãoWhen suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
April 02, 2017Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. TuckerPart One of a Three-Part Article
There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
April 02, 2017Jared CosegliaPerimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
April 02, 2017Ian RaineMany organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
April 02, 2017Ari KaplanIt happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.
April 02, 2017Dan LearAny company operating globally should protect its value through exposure containment under both privacy shield and the forthcoming GDPR.
April 02, 2017Dan Panitz and H. Bruce Gordon











