News & Analysis as of

Data Protection e-Discovery Professionals Confidential Information

U.S. Legal Support

Secure Use of Artificial Intelligence for Data Processing in the Legal Services Industry

U.S. Legal Support on

As legal service providers increasingly leverage artificial intelligence to enhance efficiency and accuracy across a variety of services, ensuring the security and integrity of sensitive client data remains a primary focus...more

HaystackID

[Webinar] Protect Sensitive Data and Control Costs: An eDiscovery Blueprint for the Construction Industry - January 29th, 11:00 am...

HaystackID on

The construction industry faces unique challenges in eDiscovery, from managing vast data volumes to protecting sensitive communications and plans. HaystackID®’s upcoming webcast will explore practical and advanced artificial...more

EDRM - Electronic Discovery Reference Model

Enhancing Security in Law Firms: The Imperative of Multi-Factor Authentication

In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With cyber threats becoming more sophisticated, relying...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law. - September 28th, 2:00 pm - 3:00 pm BST

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

EDRM - Electronic Discovery Reference Model

[Webinar] Are Large Language Models Like GPT Secure? A Look at the Technology and the Law - September 13th, 1:00 pm - 2:00 pm ET

In an age of digital transformation, the legal industry is increasingly thinking about using AI and Large Language Models (LLMs) like GPT for document review, legal research, and even writing legal briefs. Yet, in our...more

EDRM - Electronic Discovery Reference Model

3 Strategies for BYOD Risk Mitigation with Departing Employees

Companies continue to adopt Bring Your Own Device (BYOD) policies to save money and relieve employees of the “two-phone burden.” However, such policies come with clear risks. Companies must remain particularly concerned when...more

Nextpoint, Inc.

Mr. Jones and Me – Exploring the Practical Ediscovery Lessons from the Alex Jones and Sandy Hook Litigation

Nextpoint, Inc. on

An important word has been missing from much of the talk about Alex Jones: Ediscovery. But ediscovery is where it all went wrong in the fiasco of his case. In a bizarre twist of events that are even “too dumb” for a Law...more

Association of Certified E-Discovery...

Legal AI Series [Chapter Eight]: AI-Powered Redaction: Protect Your Docs, and Media, Too

So far, our discussions about the AI legal revolution have revolved around the many ways artificial intelligence is helping to combat the unstructured data crisis looming over the legal industry. However, one area we’ve yet...more

Lighthouse

Does Cellular 5G Equal 5x the Fraud and Misconduct Risk?

Lighthouse on

Increased cellular speed through mobile devices offer increased opportunity for fraudsters to circumvent corporate IT controls by using shadow IT platforms to infiltrate proprietary and confidential data at scale, wreak havoc...more

Baker Donelson

Sitting with the C-Suite: Looking Ahead to Potential Compliance Issues Due to COVID-19

Baker Donelson on

Ian Campbell, the President and CEO of iCONECT, has a design background and, prior to founding iCONECT, he worked in advertising and founded his own agency. In 2012 iCONECT launched its flagship review product, Xera, which...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide