These awards recognize 24 firms and over 200 authors (from among more than 40,000) who published their excellent thought leadership on JD Supra in 2016.
Probably the most important aspect of the change process is correctly diagnosing the opportunity or issue precipitating the need for change.
The Security Audit Questionnaire from the EDRM was designed primarily to help evaluate the security capabilities of cloud providers and third parties offering electronic discovery or managed services.
Bottom line: if your firm is using social media for business communications, you need to be capturing that communication and retaining it in a way that makes it easy to proactively supervise for potential compliance policy violations as it gets published.
Many US companies may not realize that they might also have to comply with this new EU data security regulation. That’s because the GDPR applies to any business that holds data about, or which markets to individuals within the EU.
Does the inevitable triumph of AI robots over human reason and logic mean that the legal profession is doomed? Will Watson be the next generation’s lawyer of choice? Ralph Losey does not think so and shares his thoughts on this important topic.
To collect ESI held within Slack, Slack has created an easy way for users, supervisors, and legal teams to extract data held within its platform.
On January 11, U.S. and Swiss authorities announced final agreement on the Swiss-U.S. Privacy Shield Framework. The Framework defines standards for handling personal data exported from Switzerland to the U.S. and enables U.S. companies to meet Swiss legal requirements to protect personal data transferred from Switzerland.
On the e-discovery vendor front, the pace of consolidation of large service providers in 2016 was unprecedented compared to prior years.
A new survey reveals that 65 percent of senior IT and security executives think that the biggest security risks for business come from public clouds.
I have seen hundreds of mistakes over the years, especially in the last decade when my work as a lawyer has been limited to electronic discovery. Many of these blunders were made by “the other side.” Some were funny and made me smile, others were not and led to motions of all kinds. Keeping it real, I have made my own fair share of errors too. Those lessons were painful, but are now deeply etched
The New York Department of Financial Services has released an extensively revised cybersecurity regulation applicable to the wide variety of financial services companies regulated by the NYDFS. Released on December 28, 2016, the revised regulation makes multiple changes to almost every provision in the original proposal.
Putting aside the dystopian views that sensationalize AI, bright prospects are ahead for corporations that embrace this transition to new ways of thinking. However, to make the leap, some radical adjustments in the ways of working are necessary.
A season appropriate reposting of how vendors can “give” as a means of “thanking” clients.
The Article 29 Data Protection Working Party (WP29) recently held its December plenary meeting to discuss certain issues related to the implementation of the General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679), which will take effect in May 2018, and of the Privacy Shield, which was opened for self-certification by companies in August.
But as serious as these [recent] incidents are individually and collectively, none effectively illustrates the potential catastrophic consequences that cyber incidents can have when they transcend individual institutions, and affect our markets and financial systems.
The new data privacy regime is expected to result in enhanced transparency, accountability, and individuals’ rights, while optimizing organizational approach to governance and management of data protection as a corporate issue.
Traditional technologies such as relational database management systems make it challenging, if not impossible, to process growing volumes of data and make it accessible, actionable and flexible to changing needs in terms of queries and analytics.
SaaS Benefit: Putting costs under operational expenses also affords companies better control of technology spending across the enterprise.
Cloud services providers are subject to HIPAA as business associates even if they are unable to view PHI.
Do you use email in your business? The CAN-SPAM Act, a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.
Trustees are concerned about the integrity of the data not only in preparation for possible litigation, but also because when they confirm that data to the court or other parties, their personal integrity is at stake.
Increased regulatory and ethical pressures are transforming the traditional role of compliance. Compliance departments are taking on broader responsibility for ethics, compliance, corporate culture, and social responsibility. With greater frequency, they are moving out from under the legal department into a direct reporting relationship to the CEO and/or Board, particularly in highly regulated industries.
Why is it that tools to improve our work performance are being spewed out by vendors at an ever faster rate, yet productivity and engagement seem steadfastly immune to their charms?