News & Analysis as of

Forensic Examination Discovery Attorney-Client Privilege

Baker Donelson

Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

Baker Donelson on

In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more

EDRM - Electronic Discovery Reference Model

May’s Notable Cases and Events in E-Discovery

[Editor’s Note: This article was first published May 15, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more

Davis Wright Tremaine LLP

Another Court Limits Discovery Protections for Digital Forensic Investigations

A recent magistrate decision from the Middle District of Pennsylvania adds to the growing body of cases limiting discovery protection for forensic reports and other materials prepared in response to a data security incident....more

Patterson Belknap Webb & Tyler LLP

Forensic Analysis and Privilege in the Wake of a Data Breach

In the wake of a data breach, counsel will often require the assistance of a forensic firm in order to provide legal advice to their client. The forensic analysis—which is often memorialized in a report to counsel—is crucial...more

Akin Gump Strauss Hauer & Feld LLP

Update: Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. In contrast to an earlier...more

Troutman Pepper Locke

Evaluating Stand-Alone Privilege for Cybersecurity Info

Troutman Pepper Locke on

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide