Posts by Josh Markarian
Assess Risk After a Breach – Including Security Breach Notification Laws By State
A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted environment. Data breaches can come in a plethora of forms, most commonly: ransomware, malware, phishing, denial of service & physical theft.
Read More5 Upcoming Legal Industry Conferences & Events
Here are five upcoming events in the legal industry to consider if you are looking to expand your industry knowledge, learn about emerging trends and connect with legal thought leaders.
Read MoreChallenges Surrounding Social Media Discovery
Social media has the potential to complicate cases from the first meeting with a client all the way through the delivered ruling. With the increasing popularity of social media across multiple platforms and devices, social media discovery is more likely to play a major role in litigation these days than not. Yet, despite its prevalence, there are still some very big challenges in using evidence from social media effectively during litigation. In are additional challenges.
Read MoreIoT (Internet of Things) Snapshot
Technology is connecting our lives like never before due to countless Wi-Fi enabled gadgets and thousands of mobile applications. The Internet of Things (IoT) is the ever-increasing network of devices that have their own IP address; think about your phone, smartwatch, GPS, tablets, Google Glass etc. Devices that were once standalone such as the thermostat, vehicle sensors, medical implants, alarm systems, and garage doors can now all be networked to the internet.
Read MoreBiometric Information Privacy Act at a Glance
The BIPA guards against the unlawful collection and storing of biometric information.
Read MoreCalifornia Consumer Privacy Act (CCPA) Overview
The California Consumer Privacy Act (CCPA) gives customers extensive new rights protecting their personal information. Under the new regulations business will need to publicly disclose their data sharing and privacy practices and give them the option to have their data cleared. One goal of this is to clear away unsolicited marketing and allow consumers the…
Read MoreControlling Your Data: Optical Character Recognition (OCR)
Optical Character Recognition (OCR) is technology that aids in converting paper based documents, images and large volume repositories into electronically searchable and archival data. OCR can work with both hard copy data and digital information helping reviewers and teams boost visibility and control over their data.
Read MorePrimer on Dark Data
Dark Data is all of the “non conventional” sources for data that are commonly overlooked in discovery. Dark data can be unstructured and a lot of the time can be a daunting unstructured repository of information assets. These types of data are similar to big data and are also a part of the bigger whole…
Read MoreISO/IEC 27701 – About the New Privacy Information Management Standard
ISO/IEC 27701 is an extention to the existing ISO/IEC security standards 27001 and 27002. ISO/IEC 27001 specifies a management system that is intended to bring information security under management control and gives specific requirements.
Read More“Tagged” Social Media Photos are Within Scope of Discovery NY Appeal Court Ruling
In Vasquez-Santos v. Mathew, 8210NIndex 158793/13 (N.Y. App. Div. Jan. 24, 2019), the New York Appellate Division, First Department panel “unanimously reversed” an order by the Supreme Court, New York County last June that denied the defendant’s motion to compel access by a third-party data mining company to plaintiff’s devices, email accounts, and social media accounts, so as to obtain photographs and other evidence of plaintiff engaging in physical activities and granted the defendant’s motion.
Read More