Cloud services providers are subject to HIPAA as business associates even if they are unable to view PHI.
In an industry founded on the legal and ethical obligation to keep information confidential, a data breach erodes trust and may even be grounds for legal and regulatory actions.
Many firms have the mistaken impression that their data is safest where they can “touch” it and are hesitant to move it from on-premise to the cloud. Yet, law firms aren’t actually that confident about their own security.
Cloud-centric computing is inevitable because the network, not your network, is just a conduit to allow access from trusted requestors to trusted resources.
“Law firms that elect to avoid cloud-driven solutions with the intention of offering clients greater security may not actually be providing greater security.”
One of today’s most disruptive information technology trends is software containers, a technology that’s poised to transform the enterprise IT landscape by revolutionizing the way software is built and run.
Many business executives are overwhelmed by the management of mobile devices and the information they create. That does not have to be the case.
BC Partners and Medina Capital today announced an agreement to acquire Brainspace Corporation, a privately-held machine learning and analytics company based in Addison, Texas, as part of a new joint venture to create a global cybersecurity company providing software, services and infrastructure.
“It’s really the first complete offering of what we call data discovery from the point of creation.”
Rogue SaaS adoption invites a host of risks, from unprotected corporate data, including personally identifiable employee or client information, payment card details and intellectual property, to wasted IT spend on unused SaaS subscriptions.
Now more than ever before there is an increased demand for employees to share and collaborate on documents with people inside and outside of their organizations.
Don’t think that data is only a value driver for stratospheric M&A valuations. It can also form a significant portion of the remaining value of a company during the bankruptcy process.
In-Place Records Management is when the Records Management Solution does not physically move the content to manage it; the content remains it its original location, but the solution is managing the retention policies and overall File Plan for the content.
Analysis of a file share environment – in isolation – is not information governance; it is simply a snapshot assessment of content at a given point in time.
Customer List Confusion: The Pesky Persistence of the “Brummerhop” Rule in Texas Trade Secrets Litigation
I’ve noticed that some Texas courts are also confused about customer lists as trade secrets. They think that a misappropriated customer list can be a “trade secret”even if the information in the list is “readily ascertainable” by competitors.
The good news is that existing DLP can easily be enhanced with other technology that can fill in the gaps and enable it to play to its strengths – essentially upgrading it to “DLP 2.0”.
Lawyers confront disruptive technologies by pretending they don’t exist, like those firms who advised clients to steer clear of cloud computing or the multitudes spending millions of client dollars to contort electronic data into printed, paginated documents.
As many have learned the hard way, placing information on a company intranet, extranet or the internet can open up a world of unintended consequences.
Trust, or the lack thereof, is the number one factor blocking the adoption of software as a service (SaaS). A case could be made that data is the most important asset of any business—data about products, customers, employees, suppliers, and more.
“It’s a chaotic and confusing environment. There are multiple threat vectors, increasingly sophisticated and effective attacks, and a general lack of security standards.”
Covered entities and their business associates need to understand the basics of how HIPAA data breaches are determined, and what they can do to keep information secure.
Big Data is one of the most potentially dangerous and destructive new technologies to come about in the last century. While a new fighter jet or a new type of bomb can certainly wreck havoc, big data has the potential to insidiously undermine and subtly (and not-so-subtly) change almost every aspect of modern life.
The eDiscovery Business Confidence Survey is a non-scientific quarterly survey designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem. The term ‘business’ represents the economic factors that impact the creation, delivery, and consumption of eDiscovery products and services.
The only times enterprises run into issues with cloud costs, deployment or other issues is when they try and completely “DIY.” Cloud may have radically democratized solution availability, but there are still complexities in the selection, installation and management process that should not be overlooked.