News & Analysis as of

Confidential Information Information Governance

K2 Integrity

Information Leaks: How To Respond, Investigate, And Protect Your Business

K2 Integrity on

Information leaks pose a growing and multifaceted risk to organizations across sectors. While often associated with cybersecurity breaches, the majority of such incidents stem from human error or intentional misconduct. On 25...more

U.S. Legal Support

Best Practices to Secure Law Firm Documents

U.S. Legal Support on

Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more

Foley & Lardner LLP

AI in Drug Discovery: 2025 Outlook

Foley & Lardner LLP on

Looking forward to the 2025 prediction season, a survey of the emerging AI-powered drug discovery landscape has been making the rounds—and with good reason. The survey, summarized by Stanford’s Chris Bradbury, is likely the...more

TransPerfect Legal

Three Strategies to Prevent Departing Employees from Absconding with Trade Secrets and Other Confidential Business Information

TransPerfect Legal on

One of the biggest threats to modern corporations involves departing employees who take confidential business information (CBI) and/or trade secrets with them prior to or upon their departure. Indeed, the misappropriation of...more

EDRM - Electronic Discovery Reference Model

March’s Notable Cases and Events in E-Discovery

This Sidley Update addresses the following recent developments and court decisions involving e-discovery issues: 1. an order from the U.S. District Court for the Eastern District of California granting a motion to compel...more

Maynard Nexsen

Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton

Maynard Nexsen on

This week, hosts Tina and Cherie are joined by Clark Walton, a Digital Forensics Expert, Attorney, and Legal Forensics Instructor for Reliance Forensics. They have an insightful discussion on digital forensics and what...more

Epiq

How to Remain Data Defensible During Divestitures

Epiq on

Create a divesture strategy, monitor the portfolio, find a buyer, prepare to separate a portion of the business, close the sale, and oversee the transitionary period. This is the usual flow of events during a divestiture, but...more

HaystackID

Navigating International Discovery Restrictions: Seven Recommendations

HaystackID on

Background Note: International discovery exercises and investigations can be a complex and challenging process for cybersecurity, information governance, and eDiscovery professionals. Navigating the different laws and...more

PilieroMazza PLLC

OFCCP Extends Deadline for EEO-1 Data FOIA Objections

PilieroMazza PLLC on

The Office of Federal Contract Compliance Programs (OFCCP) extended the deadline from September 19, 2022, to October 19, 2022, for government contractors to object to OFCCP’s possible release of the contractors’ Type 2...more

PilieroMazza PLLC

Action Required: Federal Contractor Data at Risk of Public Disclosure

PilieroMazza PLLC on

On August 19, 2022, the Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) published a public notice to contractors about a Freedom of Information Act (FOIA) request from the Center for Investigative...more

Orrick, Herrington & Sutcliffe LLP

Five Document Management Steps to Protect an Emerging Company’s Future

Focused on getting their businesses in a position to thrive, few emerging companies think about how documents and document management policies can cause significant future litigation exposure. We have found that emails, IMs,...more

Ankura

Implementing the Sedona Conference on Information Governance: Principles 4-6

Ankura on

The Sedona Conference is a widely known institute that is focused on the study of law and policy in many areas including Information Governance (IG). The Sedona Conference Commentary on Information Governance provides 11 IG...more

Esquire Deposition Solutions, LLC

Lawyers, Be Tough Customers When Purchasing Technology

Lawyers, ask yourselves:  Can I ethically connect my work laptop computer to an unsecured public Wi-Fi network? What data security measures are in place at the technology vendors that store and process my clients’...more

HaystackID

[Webcast Transcript] Remote Security for Distributed Workforces: Review Challenges and Considerations

HaystackID on

Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more

Baker Donelson

Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19

Baker Donelson on

Ian Campbell, the President and CEO of iCONECT, has a design background and, prior to founding iCONECT, he worked in advertising and founded his own agency. In 2012 iCONECT launched its flagship review product, Xera, which...more

Davis Wright Tremaine LLP

Top HHS "Information Blocking" Regulatory Compliance Challenges

As the November 2 compliance date quickly approaches, healthcare providers are finding that tackling the new "information blocking" regulations from the U.S. Department of Health and Human Services requires substantial...more

Orrick - Trade Secrets Group

Protecting IP in a COVID-19 Remote-Work-World

Even before the COVID-19 pandemic, many employers offered remote work options. Now employers all over the world are encouraging or requiring their employees to work remote from home. ...more

Seyfarth Shaw LLP

Trade Secret Law in Russia

Seyfarth Shaw LLP on

One of the key pieces of legislation related to trade secrets in Russia is the Federal Law of July 29, 2004 on Commercial Secrecy. This was passed by the State Duma on July 9, 2004, and endorsed by the Federation Council on...more

Searcy Denney Scarola Barnhart & Shipley

BYOD – Another reasonable basis for discovery about discovery

I still remember typewriters. Heck, I still remember carbon paper, mimeographs and bag phones. Would a company, “back in the day”, have ever asked an employee, “hey, we need you to bring your own typewriter, desk,...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide