Posts Tagged ‘security’

Newsletter Update: The Week’s Five Great Reads – Big Data Edition

Newsletter Update: The Week's Five Great Reads - Big Data Edition

From ComplexDiscovery This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals. The newsletter also contains an informative weekly cartoon and clip as well as additional stories (Lagniappe) that may be of interest to individuals seeking to extend their capability […]


Slippery Slope: Harrell v. Pathmark

Slippery Slope: Harrell v. Pathmark

Proportionality in discovery cuts both ways; so, considering how hard they are to win and the customary modesty of recoverable damages, there’s a limit to how much time and money one can invest in working up slip-and-fall cases.


Cyber Liability Insurance Policies are Becoming More Popular for Law Firms

Cyber Liability Insurance Policies are Becoming More Popular for Law Firms

Despite the unwillingness to disclose breach information, more and more law firms are apparently purchasing or considering the purchase of cyber liability insurance to protect against potential data breaches.


EU’s New Data Protection Law Likely to Impact all Companies Doing Business in Europe

EU’s New Data Protection Law Likely to Impact all Companies Doing Business in Europe

The GDRP, if it becomes law, would impact any company that gathers, processes or stores data from individuals in the European Union—that is, virtually every company that does business in the EU.


NIST Offers Guidance on Securing the Tech Supply Chain

NIST Offers Guidance on Securing the Tech Supply Chain

The National Institute of Science and Technology released a new publication this week targeting supply chain risk management (SCRM) in IT procurements. The publication – Supply Chain Risk Management Practices for Federal Information Systems and Organizations – is not meant to replace current federal regulations but rather to outline a set of general guidelines that can be tailored to an agency’s processes.


Document Negation: Disregarding the Known to Find the Unknown

Document Negation: Disregarding the Known to Find the Unknown

Negation is a powerful new tool used to identify high-value words or graphical elements in documents, detect patterns across document types, and add a new dimension to Boolean logic.


Enthusiasm for the Cloud? (Cartoon and Clip)

Enthusiasm for the Cloud? (Cartoon and Clip)

Daily we read, see and hear more and more about the benefits and challenges of “the cloud.” This week our cartoon and clip features one benefit of the cloud (cartoon) and a link to a recent report on Cloud Adoption and Risk Report (clip).


Predicting The Future Of Cloud Service Providers

Predicting The Future Of Cloud Service Providers

47% of marketing departments will have 60% or more of their applications on a cloud platform in two years. Database (57%), e-mail (54%) and business applications (ERP, CRM & industry-specific apps) (49%) are the three leading application hosting investments enterprises will be making in the next two years.


ESI Observations on a Pretty Good Friday

ESI Observations on a Pretty Good Friday

Though each merit their own post, I’ve lumped two short topics together. The first concerns a modest e-discovery headache, being the cost, friction and static posed by GIF logos in e-mail. The second is a much uglier vulnerability hoppin’ down the bunny trail toward you right now; but rejoice, because you may still have time to avert disaster.


How to Ease the eDiscovery Impact of FOIA Requests

How to Ease the eDiscovery Impact of FOIA Requests

By Tim Klinger The expanding reach of the Freedom of Information Act has introduced a new dynamic at federal agencies, and it is driving the need for IT professionals in the public sector to understand and conduct electronic discovery for records being requested by individuals and private parties under FOIA. According to the Justice Department, more […]


The Cloud Economy

The Cloud Economy

The seventh installment of our quarterly Cloud Adoption and Risk (CAR) Report presents a hard data-based analysis of enterprise cloud usage. With cloud usage data from over 17 million enterprise employees spanning all major verticals, this report is the industry’s most comprehensive and authoritative source of information on how employees are using cloud services.


TAR vs. Visual Classification, An Unfair Comparison

TAR vs. Visual Classification, An Unfair Comparison

Technology Assisted Review (“TAR”) and visual classification take two different approaches to classifying documents. TAR uses the text associated with the documents being classified while visual classification bases its analysis on graphical representations of those documents.


The Challenge of Cybersecurity: Metrics and Mentions (Cartoon and Clip)

The Challenge of Cybersecurity: Metrics and Mentions (Cartoon and Clip)

Daily we read, see and hear more and more about the privacy, security and economic challenges stemming from the growing number of enterprise cybersecurity events. This week our cartoon and clip features one approach to minimizing the impact of these events (cartoon) and five quick reference links to recent and relevant mentions of cybersecurity (clip).


How to Detect, Define, & Use an Enterprise Document Attribute Matrix

How to Detect, Define, & Use an Enterprise Document Attribute Matrix

Documents in file shares, content management systems, and scanned archives are often described as “unstructured.” However, there is typically a high level of structure in and interconnectedness among those documents. This structure and interconnectedness occurs because specific document types contain recurring attributes or data elements and those attributes or data elements are shared with other document types.


Hacked Health Records Prized for their Black Market Value

Hacked Health Records Prized for their Black Market Value

“The value of personal financial and health records is two or three times [the value of financial information alone], because there’s so many more opportunities for fraud,” said David Dimond, chief technology officer of EMC Healthcare, a Massachusetts-based technology provider. Combine a Social Security number, birth date and some health history, and a thief can open credit accounts plus bill insurers or the government for fictitious medical care.


Frivolous Law Suits? 26+ Reasons to Laugh at eDiscovery (Cartoon and Clip)

Frivolous Law Suits? 26+ Reasons to Laugh at eDiscovery (Cartoon and Clip)

Regularly we read, see and hear incredibly serious presentations and pontifications related to the theory, practice and business of electronic discovery. This week our cartoon and clip features a quick look at Rule 26(f) conference planning for a frivolous lawsuit (cartoon) and a quick reference link to a very serious retrospective listing of 26 eDiscovery-related cartoons (clip).


A Look Back: NetDiligence 2014 Cyber Claims Study

A Look Back: NetDiligence 2014 Cyber Claims Study

The NetDiligence 2014 Cyber Claims Study relies on data voluntarily provided by insurers about amounts paid out on cyber claims occurring from 2011 through 2013. Since the Study only accounts cyber claims reported to larger insurers, NetDiligence believes its study only accounts for 5-10% of the total number of all cyber claims handled in those years.


The Legal Precedent Requiring Encryption in the Cloud

The Legal Precedent Requiring Encryption in the Cloud

There is a growing number of government and industry regulations and standards designed to help protect the confidentiality of data that companies have in their care. The need for guidance in this area is obvious, as 2014 saw a record number of software vulnerabilities and actual data breaches. Unfortunately, many of the companies that experienced those breaches are now facing lawsuits filed by individuals, investors and other entities that claim they were harmed by the exposure of their information.


Beyond the Abstract: Considering Investing and Investors in eDiscovery (Cartoon and Clip)

Beyond the Abstract: Considering Investing and Investors in eDiscovery  (Cartoon and Clip)

Regularly we read, see and hear more and more about mergers, acquisitions, investments and investors in the business of electronic discovery. This week our cartoon and clip features an abstract look at investing in eDiscovery (cartoon) and two quick reference links that highlight merger, acquisition and investment activities from both an activity level and an investor level (clip).


Boosting PII Detection and Protection in “Unstructured” Content

Boosting PII Detection and Protection in "Unstructured" Content

One of the most challenging aspects to identifying and protecting PII is how to deal with “unstructured” content, i.e., with documents or files on file shares, personal computing devices, and content management systems. These files can be generated within and outside the organization using many applications, can be converted to multiple file formats (most commonly to PDF), and seemingly have unlimited form and content.


Data Analytics Dominates Enterprises’ Spending Plans For 2015

Data Analytics Dominates Enterprises' Spending Plans For 2015

83% of organizations are prioritizing structured data initiatives as critical or high priority in 2015, and 36% planning to increase their budgets for data-driven initiatives in 2015.


A Skeleton Key – Beyond Politics! – to Clinton Email and Information Governance Issues

A Skeleton Key – Beyond Politics! – to Clinton Email and Information Governance Issues

Secretary Clinton will likely do unintentionally for the duty to preserve electronic records in controversy what Edward Snowden did intentionally for the very right to privacy from government surveillance that Secretary Clinton now claims: She may put it on the map—into the global, public tag cloud—in a big way.


The Cost of Email: Metrics and Mentions (Cartoon and Clip)

The Cost of Email: Metrics and Mentions (Cartoon and Clip)

Daily we read, see and hear more and more about the challenge and cost of managing email. This week our cartoon and clip features a metric highlighting one cost of email (cartoon) and four quick reference links to recent mentions of the potential impact of organizational email practices (clip).


Prioritizing Information Security? A Reason and Resource (Cartoon and Clip)

Prioritizing Information Security? A Reason and Resource (Cartoon and Clip)

Daily we read, see and hear more and more about the challenge of information security for private and public sector organizations. This week’s cartoon and clip features one of the reasons information security is so important to organizational leaders (cartoon) and a quick reference link to one of the most current and comprehensive resources for actionable security-related intelligence for businesses and governments (clip).