Known by many as the technology underpinning the bitcoin digital currency, blockchain has acquired a new identity in the enterprise.
True believers say blockchain could reduce the need for businesses to organize as companies, which get work done via command and control. Using blockchain, they say, collaborators will be able to work together as free agents instead of under a hierarchy of bosses.
The legal practitioners’ security debate focuses on whether the legal world should be using cloud or cloud-like offerings during the course of their practice—whether that practice is as part of an in-house legal team or with a firm.
Whether you call it ‘shoulder surfing,’ or just plain eavesdropping, new research from 3M and the Ponemon Institute outlines the risks of visual hacking.
If you’ve been putting off adopting encryption as a part of your security policy, delay no more. Here’s a guide to the science of encryption, and how you can begin implementing an encryption strategy today.
EDRM, the leading standards organization for the e-discovery market, announced today the establishment of a new project to develop and provide a security survey.
More and more, social media is being used as evidence against the wealthy in cases of fraud, according to a recent article in The Telegraph, which states that, according to leading cybersecurity firms, “social media posts are used as evidence in around 75 per cent of all litigation cases.”
Cloud adoption is growing, but companies aren’t taking security into account the way they should. A fresh Ponemon Institute survey shows that many businesses simply aren’t adopting appropriate governance and security measures to protect sensitive data in the cloud.
Epiq will become a privately-held company and will be combined with DTI, a leading global legal process outsourcing (LPO) company majority-owned by OMERS and managed by OMERS Private Equity.
Large and small businesses are looking to additional forms of security to protect themselves and their customers from unauthorized access.
Corporate executives are fed up with the current approach to network security. They’ve been spending more and more on security. Despite that spending, they’re told that they can’t expect to keep intruders out of their networks; the best they can hope for is to lock the intruders out of their most important files, or to keep hackers from exfiltrating all that data.
One of the most striking findings of the survey (which covered firms of less than 30 attorneys) is how they spend their time.
Companies that participate in Privacy Shield will be able to offer to their EU business partners and affiliates a means to lawfully transfer personal data to the United States.
For companies that depend on confidential information to provide them a competitive edge, there are several proactive steps they should take to ensure their use and the full benefits of this statute if their trade secrets are stolen.
The European Commission has formally adopted a new agreement governing the transfer of data between Europe and the United States, more than eight months after the longstanding “Safe Harbor” transfer deal was invalidated amid concerns over US surveillance.
While security remains a concern for cloud computing, a study from the Cloud Security Alliance found that 65 percent of security officers and IT managers think the cloud is at least as secure as on-premise software. Getting beyond the security concern represents an important tipping point, but the cloud is really about scalable and flexible back-end processes.
If client information is now contained in data, then breaches of data security are reasonably considered to be violations of confidentiality and the attorney-client privilege as well.
If you leave your company and then use a former co-worker’s credentials to access your former company’s computer systems, you could be a hacker.
Good information governance requires not only protecting the security of sensitive and proprietary information; it often requires pursuing legal action against those who threaten the secrecy and value of a company’s trade secrets.
Trans-Atlantic data transfer did not end abruptly when Safe Harbor was invalidated. U.S. and EU trading partners continue to do business and will do so with or without Privacy Shield, and forward-looking companies would do well to recognize that data security is a challenge that will grow more difficult no matter what trade agreements are in place.
Litigation and e-discovery expert Chris Dale believes Brexit will likely be a boon to e-discovery consultants and attorneys – at least for a while. “In the short run, turmoil will likely be positive. Regulatory details, mergers and acquisition, cross-border disputes, transactional work, and all kinds of legal work will be in high demand as there will be massive legislative efforts to untangle the current legal framework,”
Despite the many potential benefits of big data analytics, the unrestrained creation and retention of data has the potential to bury organizations under a mountain of legal, regulatory and operational challenges.
A major divide exists within many organizations between the governance, automation and scalability needed by IT and the ease of use and flexibility business users demand – and it can no longer be ignored. But what’s to be done?
The continuing role of paper records in office life is a stark reminder that data security is not limited only to electronic records.