Rethinking Records Retention
A Less is More Strategy for Data Risk Mitigation
Data Retention and Document Holds
Healthcare Document Retention
The NYDFS Updates Its Stringent Cybersecurity Regulations. Is This a Bellwether of Coming Industry Change? - The Consumer Finance Podcast
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 6: Teams Channels – The virtual collaboration workspace
M365 in 5 – Part 5: Teams Chats – Modern communications
M365 in 5 – Part 4: Teams – An introduction to collaboration
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Sitting with the C-Suite: Information Governance and eDiscovery - Key Compliance Issues for In-House Counsel
Sitting with the C-Suite: Trial Teams – Narrowing Data through Centric Search
Sitting with the C-Suite: Normalizing Business Practices through Litigation Data
Compliance Perspectives: Regulatory Conflicts in Data Privacy Laws
Jones Day Presents: Effect of GDPR, CCPA, and FTC on Blockchains
[WEBINAR] Public Records Act - Taming the Email Tiger
E14: The Three Pillars of GDPR
On April 22, 2025, the Federal Trade Commission (FTC or the Commission) published an updated Children’s Online Privacy Protection Act (COPPA) Rule (Rule) in the Federal Register. The updates are effective June 23, 2025. But...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Businesses take heed: California state officials just warned that the law prohibits you from collecting unnecessary data and retaining data for longer than necessary. The California Privacy Protection Agency published its...more
On January 9, 2024, the Federal Trade Commission (FTC) issued its first ever prohibition on the use, sale and disclosure of sensitive location data against X- Mode Social and Outlogic (“X-Mode”), a location data broker. Only...more
The Children’s Online Privacy Protection Rule requires operators of websites and online services that are directed to children under 13 years of age, or that have “actual knowledge” they are collecting personal information...more
Providers in the mobility space take note. The Estonian Data Protection Inspectorate, Andmekaitse Inspektsioon, conducted a short term vehicle rental sweep that could be important in light of a declared connected vehicle...more
Remember the early days of email when there was such a thing as a clean and organized inbox? I remember I would even create separate folders and organize my messages according to themes. And then at some point, that effort...more
Short, often informal messages have become an increasingly prevalent form of business communication. Whether by sending a simple text message or using a communication application like WhatsApp, Slack, or MS Teams, employees...more
E-Discovery is an ever-changing field. There’s always new technology cropping up—whether it’s a means of communication that legal teams need to account for or a new software solution that promises to change how e-discovery...more
What do obscenity and data minimization have in common? As Justice Potter Stewart famously wrote in his concurring opinion to the U.S. Supreme Court’s decision in the 1964 free speech case Jacobellis v. Ohio, “I know it...more
Due in large part to unlimited cloud storage and the ever-evolving list of new cloud-based tools and applications, organizations are creating more data than ever before. This can create risk, increase cost, and weigh down...more
Be honest: does your office look like this? There are two basic approaches to managing stuff of all kinds, from paper and digital files to clothing and personal items: are you more of a maximalist who keeps everything or a...more
How much data is your organization obligated to preserve for ediscovery in a pending or anticipated litigation matter? What steps should you take to preserve that data?...more
New York City tenants harboring “big brother” concerns over landlords abusing data collected through smart access (i.e., keyless entry) systems will soon be able to rest easier. Following California, Virginia, and the British...more
Anthony Diana and Trevor Satnick from Reed Smith, joined by Lighthouse’s John Holliday, discuss the enhanced file share and collaboration functionality in SharePoint Online, including real-time collaboration, access controls...more
Tune in for the launch of our M365 in 5 Foundation Series for a primer on what legal, compliance and C-suite executives need to know about M365 apps and tools. Listen to Reed Smith’s Anthony Diana and Therese Craparo – and...more
There is an ever-increasing volume of data generated by businesses. In an effort to reduce storage costs and ameliorate privacy concerns, companies have embraced ephemeral, or self-destructing messaging. And, while...more
Technology is moving at the speed of light while we all continue to live in a largely virtual world where we interface with each other, online, everyday. Sprinkled in are continued concerns about how companies, large and...more
Most knowledge work these days demands some form of collaboration. You draft a document; your colleagues comment on it and make suggestions for how it could be better. You chat on Slack about how to incorporate those...more
E-discovery is an important aspect of litigation. Well-established data gathering protocols and workflow procedures pertaining to electronic data are important. Meticulous record-keeping, workflow procedures, and processes...more