Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Key Discovery Points: Timing is Mostly Everything in eDiscovery
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
How Attorneys’ Views on AI Are Impacting eDiscovery
Key Discovery Points: Get Your Objections In Early – and Keep Your Filings Succinct
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
Firma digital y firma electrónica, parecidas … pero diferentes
eDiscovery Needs Digital Forensics for a Mobile World
Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
Legal transcription services play a vital role in legal matters, ensuring that live oral arguments and other audio or video content are fully accessible to all stakeholders in text. When managing transcription...more
In the history of technological revolutions, there are moments that challenge not only our understanding of what is possible but the very nature of reality itself. Google’s latest refinement to its quantum computer, Willow,...more
Complex investigations are on the rise with investigators being asked to do more with less, therefore needing to gain efficiency to handle workloads. A complex investigation can be triggered by a litigation event, government...more
ComplexDiscovery Editor’s Note: Sandra Joyce’s keynote at the Tallinn Digital Summit 2024 offers a vital look into the shifting dynamics of the cyber threat landscape. As an annual gathering of leaders from the digitally...more
July 6, 2024 – Rufus – How to Create Bootable Media with ISO Files If you have a flash drive or disc from which you want to access a program when booting up in BIOS, the data can be saved in an .iso file – which acts as a...more
Editor’s Note: In this exploration of cybersecurity in the digital era, the article “Shifting Left in eDiscovery: Embracing Secure-by-Design and AI for Enhanced Cybersecurity” considers the crucial intersection of...more
DefCon’s AI Village - Sven Cattell, shown above, is the founder of a key event at DefCon 31, the AI Village. The Village attracted thousands of people eager to take part in its Hack The Future challenge. At the Village I...more
Hackers responded to the White House call by the thousands, including reporter-AI-hacker Ralph Losey, to try to break existing software in open contests. Ralph joined in the AI hack attack, but there were many other...more
With the discussion around the impact of generative AI dominating the dialogue within the legal services industry, it is easy to buy into the hype without considering if the technology is the appropriate tool for the task. ...more
On May 12, 2023, Chat GPT-4 began its release to the public of two new features in GPT-4, Web Browsing and Plugins. Just a few days later, a red-team instructor, Johann Rehberger, claimed to have made a successful indirect...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
A New Approach to Security in the WFH (home) and WFC (cloud) Era - In the Middle Ages, kings and other nobles secured their fiefdoms with a high-walled castle and a moat. The moat was designed to make it difficult for...more
This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered even more, by mainstream media. A ransomware attack by the Conti ransomware group has left the Costa Rican...more
The automotive industry has been a tight-knit and exclusive club since the 1950s automobile boom. After months of distress caused by semiconductor chip shortages, assembly plant shutdowns, and higher prices, is that still the...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the...more
The Coronavirus pandemic is moving more organizations to remote working models. This enhances the potential trajectory for data security incidents and other information exfiltration to increase dramatically. The number of...more
Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more
Ari Kaplan recently spoke with Kenya Parrish-Dixon, a member of the ACEDS Global Advisory Board and the General Counsel and Chief Operating Officer for Empire Technologies Risk Management Group, a cybersecurity, information...more
Editor’s Note: On June 23, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how to consider and operationalize data mapping processes utilized in the...more
It’s hard to read the news these days without hearing about another major breach. No one is immune to these attacks including government, social media, law firms, dating websites, credit reporting agencies, and even our...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
According to Exterro's recent 2020 Corporate Legal Leaders Report, 7-in-10 Legal Departments are now managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity...more