FRCP Rules 16(b) and 26(f) is in place to ensure that a discovery plan is enacted early on, if not as soon as possible and that there is communication between parties regarding the scope of discovery.
How utilizing data filtering, de-duplication, reduction, and sampling reduces discovery and document review costs.
At times forensic investigations are needed to take a deeper dive into forensically collected data whether it be in response to affidavits, request for expert testimony, the need to review employee activity, or a range of other investigation triggers.
The National Institute of Standards and Technology (NIST) has just released their free of charge publication, NIST Cloud Computing Forensic Science Challenges, that highlights the key takeaways of common forensics challenges faced by experts when responding to incidents that have occurred in a cloud-computing ecosystem.
Slack, Microsoft Teams and other channel-based platforms are becoming the new normal replacing email in a capacity as the daily back and forth messaging platform. With benefits of real-time interaction and integrations from file sharing to video chatting, companies have been adopting these cloud-based platforms at scale across their enterprise.
Rule 26(g) Signing of Discovery Requests, Responses, and Objections is the requirement of engagement in discovery in a defensible and responsible way. The rule was created to limit abuse in discovery through the use of sanctions. Discovery is an essential part of the legal process and as a result a party should be given the opportunity to properly prepare and develop their case. Rule 26(g) is brought in when there is a range of issues originating from the handling of ESI and proper collection of data most commonly when there is evidence of spoliation, failure to produce, lack of due diligence, and in this case self-collection.
The topic of mobile device encryption is more talked about than ever before. Many individuals and companies alike are spending time thinking about whether or not it is a good idea to encrypt mobile devices. But what about the risk that exists when an employee refuses to hand over the encryption password to their employer regarding a company cell phone?
California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018 and first took effect at the start of the new year on January 1, 2020. The new regulations were approved on August 14, 2020 and went into effect immediately.
The Association of Corporate Counsel (ACC) has released their key findings and the full report from their 2020 STATE OF CYBERSECURITY REPORT: AN IN-HOUSE PERSPECTIVE. The study was conducted between April and May of 2020, and was composed of a target audience of ACC members in various legal department roles. The study covered an expanse…
While attending conferences, meetups and collaboration forward expos in person might not be in the foreseeable future, that doesn’t mean that those events won’t be happening. Many of these events have turned 100 percent digital, reinventing the experience, promising the same if not higher value.