Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Data Retention and Document Holds
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
eDiscovery Needs Digital Forensics for a Mobile World
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Record Retention and Information Governance
California Employment News: Synthesizing Evidence in a Workplace Investigation (Part 3)
A Look at the Metaverse’s Legal Implications, with Special Guest Samantha Green, Director of Content Marketing, Epiq
Evidence Preservation: Handling the Issues in New York and New Jersey
Keeping Up with M365 Software Updates
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: Remote Work - Increasing Communication on Collaboration Platforms
Video | Tips for Managing the Preservation of Mobile Device Data
Introduction: Understanding Cloud Data in the Modern Digital Landscape - In today’s hyper-connected digital world, we interact with vast amounts of data, much of which isn’t stored locally on our devices but instead...more
Infrastructure-as-a-Service (IaaS) is a vital model for law firms seeking better ways to organize eDiscovery data and streamline the discovery process. With thousands of documents and pieces of information to collect,...more
On January 7th, 2025, Meta announced they will be making major changes to content moderation policies on all their owned platforms, including Facebook: ending third-party fact-checking in the US in lieu of a new "Community...more
In today’s digital world, the way we handle information has transformed dramatically. With this transformation, eDiscovery has become an essential part of legal proceedings and investigations. Whether you’re involved in a...more
On this episode, Jack Clabby of Carlton Fields, P.A., and resident cybersecurity expert Kayley Melton, founder of Reality Shift, chat with Dr. Anmol Agarwal, a senior security researcher at Nokia. With deep expertise in AI...more
We’re back with a deeper dive into the 2024 Data Security Incident Response Report, which features insights and metrics from 1,150+ incidents in 2023. This episode dives deeper into information governance and...more
While the balance of security, privacy, and public safety has always been a concern, recent cyberattacks have highlighted conflicting guidance by United States government officials, creating potential pitfalls for businesses....more
In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more
Recently, the US Department of Homeland Security’s (DHS) Cybersecurity & Infrastructure Security Agency (CISA) issued a notice of proposed rulemaking (NPRM) which, if adopted, would require “covered entities” of critical...more
Amidst an ever-evolving cyber threat landscape, a recent slew of regulatory updates and cybersecurity standards are defining a new battlefront for securing critical infrastructure and corporate data across varying sectors....more
One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more
On April 4, 2024, the Cybersecurity and Infrastructure Security Agency (“CISA”) published for public comment a long-awaited proposed rule to implement the Cyber Incident Reporting for Critical Infrastructure Act of 2022...more
On March 27, 2024, the Cybersecurity & Infrastructure Security Agency (CISA) within the US Department of Homeland Security released a much-anticipated notice of proposed rulemaking (NPRM) to implement the Cyber Incident...more
The U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) is publishing a proposed rule (Proposal or NPRM) that will require broad segments of industry to meet onerous and quick...more
Yesterday, March 27, the U.S. Cybersecurity and Infrastructure Security Agency published the Notice of Proposed Rulemaking under the Cyber Incident Reporting for Critical Infrastructure Act of 2022. It is important to note...more
The federal Cybersecurity and Infrastructure Security Agency (CISA) released a draft of its proposed rule detailing how covered entities operating in critical infrastructure sectors report cyberattacks and ransomware payments...more
Data breach class actions continue to rise, following almost inevitably from nearly every major security incident. Here are seven things in-house counsel can do to prepare for that anticipated litigation....more
Earlier this month the Federal Acquisition Regulation (“FAR”) Council released two draft rules which would impose new cybersecurity requirements for federal contractors. The proposed rules, Cyber Threat and Incident Reporting...more
Join us for an exciting online event that explores the challenges and risks associated with the new work from home reality in the professional services industry. Discover how professionals are adapting to remote work and...more
Join us for an exciting in-person event at Covington & Burling LLP, New York Times Building, 8th Avenue, New York, NY 10018, USA. Discover the new reality of professional services work from home and the associated risks....more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
2022 ushered in a number of changes in privacy laws, both in the United States and abroad. Those developments include emerging state legislation and increasing enforcement actions by state and federal authorities. The area of...more
So, you just got the news every organization does not want to hear; you have become the victim of a cyber attack. While there are many different ways of approaching a cyber incident, the one thing that is consistent is...more
Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more
Most people have heard of the Health Insurance Portability and Accountability Act (HIPAA), so it’s not surprising that companies dealing with digital health information will have to be HIPAA compliant. To do so, any protected...more