Features
Privacy Issues of Contact Tracing
Companies considering whether to suggest, or even to require, contact tracing for employees or others must consider a host of legal issues, including privacy. This article describes contact tracing, focusing on how technology has made it a more powerful weapon against viruses and diseases than ever before.
Features
Video Conferencing and the CCPA
Users have become increasingly concerned about the privacy of videoconferencing platforms, due to exposure of information from security breaches. We examined the privacy policies of six prominent applications to determine their compliance with the California Consumer Privacy Act (CCPA).
Features
The State of the e-Discovery and Data Privacy Job Market: Pre and Post COVID-19 – Part 2
A deep dive into the pre and post pandemic e-discovery job market landscape and what data privacy professionals can learn from ESI employment trends. Part Two of a Two-Part Article
Features
Summer 2020 Data Privacy Updates
America and the EU Continue Altering Data Privacy Frameworks for Businesses A close look at a couple of privacy-related issuances from California, along with the European Court of Justice ruling invalidating the EU-U.S. privacy shield.
Features
Ransomware – COVID-19 & Upgrading Your Defenses
It's pretty shameful that in the current crisis we're seeing ransomware on the rise. It's even more shameful that organizations involved in fighting the virus seem to be especially at risk.
Features
Facebook and Instagram Developers Sued for Privacy Violations In U.S. and UK
Facebook filed two separate lawsuits in the UK and U.S. that the company says is part of an ongoing effort to hold developers that abuse its platform accountable.
Features
The State of the e-Discovery and Data Privacy Job Market: Pre- and Post-COVID-19, Part 1
Part One of a Two-Part Article This deep dive into the specific cause-and-effect paradigms impacting the data privacy and e-discovery verticals illustrates broader trends in the overall legal technology job market while simultaneously giving professionals in (or eager to be in) those disciplines a clear roadmap of where the legal technology, data privacy, and ESI job market was, is today, and where it will be in the future.
Features
Cybersecurity for Remote Workers: Keeping Financial Information Secure
At the beginning of the COVID-19 pandemic, businesses scrambled to rapidly deploy a remote workforce which created new challenges for businesses to continue operating and providing critical services. It also created an opportunity for malicious actors to hack into and gain access to IT systems and sensitive, personal information.
Features
Where Will the Needle Land?
COVID-19 Contact Tracing v. Protecting Personal Privacy As states roll back stay-at-home orders, contact tracing has quickly emerged as an essential tool to manage the spread of the coronavirus and allow the country to return to work safely. But innovative contact tracing methods raise a host of privacy concerns, forcing a reckoning with how we balance privacy and public health.
Features
Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it's become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
