Posts Tagged ‘security’

The Week’s Five Great Reads – Cloud Challenge Edition

The Week's Five Great Reads - Cloud Challenge Edition

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Defendant Compelled to Produce Employees’ Personal Data in EEOC Dispute

Defendant Compelled to Produce Employees’ Personal Data in EEOC Dispute

By Doug Austin In EEOC v. DolgenCorp LLC d/b/a Dollar General, No. 13-cv-04307 (N.D. Ill. May 5, 2015) , Illinois District Judge Andrea R. Wood granted the plaintiff’s motion to compel the defendant to produce electronically-stored information (“ESI”) containing personal information of the defendant’s conditional hires and complete versions of documents that the defendant previously […]


The Week’s Five Great Reads – Litigation Trends Edition

The Week's Five Great Reads - Litigation Trends Edition

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


The DOJ Sets Out to Establish Standard for Data Security Incident Response and Preparation

The DOJ Sets Out to Establish Standard for Data Security Incident Response and Preparation

Organizations face threats to their data from all fronts, from sophisticated external attacks by hackers to employee error (as the 2015 BakerHostetler Incident Response Report showed). Recognizing the prevalence of these incidents, the Department of Justice (DOJ) recently issued a guidance document intended to help organizations prepare for a data security incident. The document, titled “Best Practices for Victim Response and Reporting of Cyber Incidents,” is derived from the DOJ’s experiences investigating and prosecuting cybercriminals. The Guidelines focus primarily on the proactive and reactive measures a company may take with a data breach.


The Week’s Five Great Reads – Defining Unstructured Data

The Week's Five Great Reads - Defining Unstructured Data

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Whack-A-Mole: Fighting False Positives in Document Classification

Whack-A-Mole: Fighting False Positives in Document Classification

By John Martin Whack-a-mole describes a situation in which attempts to solve a problem are piecemeal or superficial, resulting only in temporary or minor improvement, as in, “the site’s security team has an ongoing battle against spammers, but it’s a game of whack-a-mole.” See Oxford Dictionaries . The whack-a-mole concept is familiar to those attempting […]


The Week’s Five Great Reads – IG Trends Edition

The Week's Five Great Reads - IG Trends Edition

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Hidden Gold in Governance

Hidden Gold in Governance

The discipline known as information governance has risen in visibility and application over the past year. And the bigger a law firm is, the more data it generates and stores-and must control and keep safe.


Trends in Information Governance: eDiscovery and Big Data

Trends in Information Governance: eDiscovery and Big Data

Organizations have the best chance for information governance success by concentrating on the highest risk and biggest pain points. IT’s domain is first in line.


DocType Risk Assessment: The InfoSec Key for Unstructured Content

DocType Risk Assessment: The InfoSec Key for Unstructured Content

In simplest terms, information security involves identifying and protecting information that could somehow damage an organization legally or competitively if it were misused. Achieving those objectives in unstructured content is far easier if the organization first classifies documents by document type and evaluates the types and levels of risk associated with each type. Once that is done there are many ways to protect that information.


Newsletter Update: The Week’s Five Great Reads – Enterprise Risk Edition

Newsletter Update: The Week's Five Great Reads - Enterprise Risk Edition

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


The 13 Point Checklist for Choosing your Cloud Provider

The 13 Point Checklist for Choosing your Cloud Provider

As cloud migration escalates, it is vital that companies first understand their specific requirements, before choosing their cloud provider, says Jack Talbot, general manager, managed hosting – New Zealand, of ICONZ-Webvisions. “Decide which metrics are key for your organisation, then measure each cloud vendor against the prioritised metrics,” he states. He lists 13 issues to consider.


Right Now, The Internet Of Things Is Like The Internet Of The 1990s

Right Now, The Internet Of Things Is Like The Internet Of The 1990s

Smart homes and other connected products won’t just be aimed at home life. They’ll also have a major impact on business. And just like any company that blissfully ignored the Internet at the turn of the century, the ones that dismiss the Internet of Things risk getting left behind.


Newsletter Update: The Week’s Five Great Reads – Big Data Edition

Newsletter Update: The Week's Five Great Reads - Big Data Edition

From ComplexDiscovery This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals. The newsletter also contains an informative weekly cartoon and clip as well as additional stories (Lagniappe) that may be of interest to individuals seeking to extend their capability […]


Slippery Slope: Harrell v. Pathmark

Slippery Slope: Harrell v. Pathmark

Proportionality in discovery cuts both ways; so, considering how hard they are to win and the customary modesty of recoverable damages, there’s a limit to how much time and money one can invest in working up slip-and-fall cases.


Cyber Liability Insurance Policies are Becoming More Popular for Law Firms

Cyber Liability Insurance Policies are Becoming More Popular for Law Firms

Despite the unwillingness to disclose breach information, more and more law firms are apparently purchasing or considering the purchase of cyber liability insurance to protect against potential data breaches.


EU’s New Data Protection Law Likely to Impact all Companies Doing Business in Europe

EU’s New Data Protection Law Likely to Impact all Companies Doing Business in Europe

The GDRP, if it becomes law, would impact any company that gathers, processes or stores data from individuals in the European Union—that is, virtually every company that does business in the EU.


NIST Offers Guidance on Securing the Tech Supply Chain

NIST Offers Guidance on Securing the Tech Supply Chain

The National Institute of Science and Technology released a new publication this week targeting supply chain risk management (SCRM) in IT procurements. The publication – Supply Chain Risk Management Practices for Federal Information Systems and Organizations – is not meant to replace current federal regulations but rather to outline a set of general guidelines that can be tailored to an agency’s processes.


Document Negation: Disregarding the Known to Find the Unknown

Document Negation: Disregarding the Known to Find the Unknown

Negation is a powerful new tool used to identify high-value words or graphical elements in documents, detect patterns across document types, and add a new dimension to Boolean logic.


Enthusiasm for the Cloud? (Cartoon and Clip)

Enthusiasm for the Cloud? (Cartoon and Clip)

Daily we read, see and hear more and more about the benefits and challenges of “the cloud.” This week our cartoon and clip features one benefit of the cloud (cartoon) and a link to a recent report on Cloud Adoption and Risk Report (clip).


Predicting The Future Of Cloud Service Providers

Predicting The Future Of Cloud Service Providers

47% of marketing departments will have 60% or more of their applications on a cloud platform in two years. Database (57%), e-mail (54%) and business applications (ERP, CRM & industry-specific apps) (49%) are the three leading application hosting investments enterprises will be making in the next two years.


ESI Observations on a Pretty Good Friday

ESI Observations on a Pretty Good Friday

Though each merit their own post, I’ve lumped two short topics together. The first concerns a modest e-discovery headache, being the cost, friction and static posed by GIF logos in e-mail. The second is a much uglier vulnerability hoppin’ down the bunny trail toward you right now; but rejoice, because you may still have time to avert disaster.


How to Ease the eDiscovery Impact of FOIA Requests

How to Ease the eDiscovery Impact of FOIA Requests

By Tim Klinger The expanding reach of the Freedom of Information Act has introduced a new dynamic at federal agencies, and it is driving the need for IT professionals in the public sector to understand and conduct electronic discovery for records being requested by individuals and private parties under FOIA. According to the Justice Department, more […]


The Cloud Economy

The Cloud Economy

The seventh installment of our quarterly Cloud Adoption and Risk (CAR) Report presents a hard data-based analysis of enterprise cloud usage. With cloud usage data from over 17 million enterprise employees spanning all major verticals, this report is the industry’s most comprehensive and authoritative source of information on how employees are using cloud services.