Posts Tagged ‘security’

Vacation Reading Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

Vacation Reading Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Trade Secrets, Security, and Cloud Computing: Best Practices Now

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Implementing common sense approaches to data protection and staying true to industry trends will likely provide significant protection for secrets, even as industry continues to push those secrets into the cloud.


The Big Data Revolution: All about Big Data, Why and How it’s Relevant for Your Business in 2015

The Big Data Revolution: All about Big Data, Why and How it’s Relevant for Your Business in 2015

Data comes in formats of all kinds – structured and unstructured – all of which must be effectively managed, merged and governed as needed for operational efficiency.


Cooperation, the SEC and FOIA

Cooperation, the SEC and FOIA

While furnishing enforcement officials the critical information may secure cooperation credit and possibly reduce liability in any enforcement action, it can increase potential future liability in other litigation.


7 Questions for Information Governance, Analytics and Business Value

7 Questions for Information Governance, Analytics and Business Value

Thanks to big data analytics, organizations that treat their data as an asset can find significant new value in the information they retain, improve competitiveness and decision making, and change the economics — the cost vs. benefit — of information production, collection and retention.


HP sells iManage in LBO

HP sells iManage in LBO

On Tuesday, iManage, the enterprise content management software company used at numerous law firms, announced a management-led leveraged buyout from Hewlett-Packard.


It is Time to Put an End to eDiscovery

It is Time to Put an End to eDiscovery

As electronic data volumes multiply, the eDiscovery problem worsens. But as the data landscape changes dramatically, the proprietors and pushers of eDiscovery remain the same, seeking to fix new problems with the same old solutions and a fresh coat of paint.


The Week’s Five Great Reads on Information Governance and eDiscovery

The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Microsoft Reportedly Buys Cloud Security Firm Adallom for $320 Million

Microsoft Reportedly Buys Cloud Security Firm Adallom for $320 Million

Microsoft is doubling down on its cloud-first product strategy. The Redmond, Wash., software maker has acquired Adallom, a cloud security startup, for approximately $320 million, according to a July 19 report from Globes, an Israeli business news organization.


Structured Data in Discovery and Class Certification

Structured Data in Discovery and Class Certification

Structured data often plays a prominent role in fighting class certification, and companies increasingly rely on structured data to oppose motions for class certification by demonstrating that plaintiffs lack commonality and typicality.


Being Compromise Ready: Cyberinsurance is a Key Component of a Strong Defense Plan

Being Compromise Ready: Cyberinsurance is a Key Component of a Strong Defense Plan

Cyberinsurance can provide much-needed tactical and financial support for companies confronted with a security incident. Generally speaking, the cyberpolicy’s first-party coverage applies to costs incurred by the insured when responding to a covered cyber event, while third-party coverage is triggered by claims and demands against the insured arising from a covered incident.


PII in your ESI: The Intersection of Data Privacy and E-Discovery

PII in your ESI: The Intersection of Data Privacy and E-Discovery

Although the definition of PII or protected information varies by jurisdiction, there are certain categories of information that are generally recognized as sensitive and should be safeguarded from unnecessary dissemination in the discovery process.


Can Your Search Application Keep a Secret?

Can Your Search Application Keep a Secret?

Information security managers tend to focus on stopping external penetration into enterprise systems and pay far less attention to information management security.


2015 Mid-Year E-Discovery Update

2015 Mid-Year E-Discovery Update

E-discovery remains an incredibly rich and rapidly developing field, as the many developments on which we report from just the first half of 2015 attest. We are seeing progress in some areas ( e.g. , predictive coding, cost recovery, and rule amendments), remaining dangers in others ( e.g. , sanctions, preservation, and cross-border discovery), and new dangers emerging ( e.g. , text messaging, mobile devices, and e-discovery vendor selection).


Use of File-Sharing Service Leads To $218,400 Fine For HIPAA Violations

Use of File-Sharing Service Leads To $218,400 Fine For HIPAA Violations

Healthcare workers should think twice about using such [Internet-based file sharing] services when documents contain protected health information, since doing so raises significant HIPAA compliance issues.


How Hacking Team and FBI planned to Unmask A Tor User

How Hacking Team and FBI planned to Unmask A Tor User

The huge cache of internal files recently leaked from the controversial Italian surveillance software company Hacking Team has now revealed that the Federal Bureau of Investigation (FBI) purchased surveillance software from the company.


LegalTech West Coast Edition: The Week’s Five Great Reads

LegalTech West Coast Edition: The Week's Five Great Reads

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


The $11 Trillion Internet Of Things, Big Data And Pattern Of Life (POL) Analytics

The $11 Trillion Internet Of Things, Big Data And Pattern Of Life (POL) Analytics

Every so often a buzzword or phrase in information security discourse surfaces from the infosec jargon din into broader public consciousness. One such buzz phrase is “pattern of life” analytics (POL).


The Next Frontier for Boards, Oversight of Risk Culture

The Next Frontier for Boards, Oversight of Risk Culture

Most recently, in the wake of a number of high-profile personal data breaches, questions are being asked about board oversight of cyber-security, the newest risk threatening companies’ long term success.


The Role of the CCO – A Q&A Session About the Evolving Role of the Chief Compliance Officer

The Role of the CCO - A Q&A Session About the Evolving Role of the Chief Compliance Officer

According to PwC’s 2015 State of Compliance Survey, the No. 1 area that compliance professionals see as a future risk is data security. It was cited by 47% of respondents as one of their top three concerns. Privacy and confidentiality came in second with around 30%.


The Top 10 Priorities For Your Information Governance Program

The Top 10 Priorities For Your Information Governance Program

An integrated Information Governance Program is considered a “best practice” to help your business “protect, detect, restore and recover” from significant data loss incidents.


NIST Releases Draft Privacy Risk Management Framework

NIST Releases Draft Privacy Risk Management Framework

Emerging technologies, such as cloud computing and the “smart city,” have the potential to greatly advance our quality of life. The use, retention, and storage of data that go along with them, however, have raised citizen concerns about privacy risks.


Chicago Levies 9% Tax on Cloud and Streaming Services

Chicago Levies 9% Tax on Cloud and Streaming Services

According to a story from NetworkWorld , attorneys from ReedSmith have reported that the city of Chicago has implemented broad new tax regulations that target the use of streaming and cloud computing services.


Healthcare Moves To The Cloud But Is The Cloud Ready For Healthcare?

Healthcare Moves To The Cloud But Is The Cloud Ready For Healthcare?

By Dan Munro In less than one year ‒ we’ve seen a staggering number of data breaches in healthcare. Almost 96 million records were stolen in just 3 high‒profile cases alone ‒ Community Health Systems (4.5 million), Anthem (80 million), and Premera (11 million). Last month saw another health data breach representing one of the […]