Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more
4/16/2024
/ Artificial Intelligence ,
Automation Systems ,
Chief Information Security Officer (CISO) ,
Cyber Threats ,
Cybersecurity ,
Data Security ,
Department of Homeland Security (DHS) ,
e-Discovery ,
Electronically Stored Information ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
Policies and Procedures ,
Popular ,
Software
Editor’s Note: There’s much conversation around how our industry should best use generative artificial intelligence (gen AI) to do our jobs. On March 19, 2024, HaystackID sponsored an EDRM virtual workshop that explored how...more
3/25/2024
/ Artificial Intelligence ,
Compliance ,
Confidential Information ,
Data Privacy ,
Data Security ,
Document Review ,
Legal Technology ,
Machine Learning ,
Natural Language Processing ,
Popular ,
Regulatory Agenda ,
Training
Editor's Note: In a historic and bold move, the U.S. government has implemented unprecedented sanctions against the Intellexa Consortium and its key figures for their roles in deploying spyware that jeopardizes privacy and...more
3/20/2024
/ Activist ,
Cyber Threats ,
Cybersecurity ,
Data Protection ,
Data Security ,
e-Discovery ,
Espionage ,
Government Officials ,
Information Governance ,
Journalists ,
National Security ,
Privacy Laws ,
Sanctions ,
Software Developers ,
Spyware ,
Surveillance ,
Technology Sector
Editor’s Note: The integration of artificial intelligence into legal services stands poised to profoundly impact cybersecurity, information governance, eDiscovery, and the broader data landscape. As this article explores,...more
11/9/2023
/ Artificial Intelligence ,
Bias ,
Client Communication ,
Cybersecurity ,
Data Privacy ,
Data Security ,
e-Discovery ,
Ethics ,
Governance Standards ,
Legal Technology ,
Litigation Strategies ,
Machine Learning ,
Policies and Procedures ,
Professional Responsibility ,
Risk Mitigation ,
Training
Editor’s Note: In a rapidly evolving technological landscape, understanding the capabilities and limitations of platforms like Microsoft 365 (M365) is crucial for law firms, especially in the realms of eDiscovery and...more
9/6/2023
/ Artificial Intelligence ,
Compliance ,
Cyber Attacks ,
Cybersecurity ,
Data Management ,
Data Security ,
e-Discovery ,
EDRM ,
FOIA ,
Fraud ,
Information Governance ,
Information Technology ,
Investigations ,
Machine Learning ,
Policies and Procedures ,
Popular ,
Ransomware ,
Sensitive Business Information ,
Sensitive Personal Information ,
Supply Chain
Editor’s Note: In this insightful transcript from an educational webcast hosted by HaystackID on June 28, 2023, our expert panel discussed the impact of generative AI that is currently dominating the dialogue within the legal...more
7/17/2023
/ Analytics ,
Artificial Intelligence ,
Corporate Governance ,
Cybersecurity ,
Data Protection ,
Data Security ,
e-Discovery ,
EU ,
Federal Trade Commission (FTC) ,
General Data Protection Regulation (GDPR) ,
Information Governance ,
Investigations ,
Machine Learning ,
PHI ,
Risk Factors ,
Risk Management ,
Technology Sector
Editor’s Note: HaystackID hosted an educational webcast on March 15, 2023, to discuss the growing importance of cyber and data hygiene in the context of privacy, cybersecurity, and data protection. The webcast focused on how...more
3/28/2023
/ Artificial Intelligence ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
General Data Protection Regulation (GDPR) ,
Incident Response Plans ,
Investigations ,
Metadata ,
Mobile Devices ,
PHI ,
Popular ,
Trade Secrets
Editor’s Note: On October 19, 2022, HaystackID shared an educational webcast on the potential impact of Apple’s iOS 16 release on the area of eDiscovery. With iOS 16, new chat manipulation and security features have gone...more
11/4/2022
/ Apple ,
Audits ,
Data Collection ,
Data Security ,
Databases ,
eDisclosure ,
Investigations ,
iTunes ,
Microsoft ,
Mobile Apps ,
Mobile Devices ,
Popular ,
QR Codes ,
Third-Party ,
WhatsApp
...This session, led by industry-acknowledged experts in areas ranging from data protection and privacy to data transfer and legal discovery, provided a professional forum for the explanation of the best approaches,...more
6/29/2022
/ China ,
Compliance ,
Consent ,
Data Privacy ,
Data Protection ,
Data Protection Authority ,
Data Security ,
Data Transfers ,
EU ,
FOIA ,
General Data Protection Regulation (GDPR) ,
International Data Transfers ,
Popular ,
Privacy Framework ,
Schrems I & Schrems II ,
Standard Contractual Clauses ,
Vendors
Editor’s Note: On September 30, 2021, HaystackID shared an educational webcast presented at the 2021 Privacy + Security Fall Academy. The webcast provided viewers with a framework and solutions for deploying privacy-based...more
Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more
6/7/2021
/ Confidential Information ,
Data Collection ,
Data Management ,
Data Security ,
Discovery ,
Document Review ,
e-Discovery ,
Electronically Stored Information ,
Information Governance ,
Legal Project Management ,
Legal Technology ,
Popular ,
Privacy Concerns ,
Remote Working
Editor’s Note: The results of the recent Summer 2020 eDiscovery Business Confidence Survey present the continuing impact of COVID constraints on the business of eDiscovery. However, for these pandemic-driven results and their...more
Editor’s Note: Given the changing environmental and economic conditions based on the outbreak and impact of the coronavirus disease 2019 (COVID-19), eDiscovery professionals are considering business revisions to their 2020...more