TERIS BLOG

Assess Risk After a Breach – Including Security Breach Notification Laws By State

By Josh Markarian | January 14, 2020 | 0 Comments

A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted environment. Data breaches can come in a plethora of forms, most commonly: ransomware, malware, phishing, denial of service & physical theft.

5 Upcoming Legal Industry Conferences & Events

By Josh Markarian | January 8, 2020 | 0 Comments

Here are five upcoming events in the legal industry to consider if you are looking to expand your industry knowledge, learn about emerging trends and connect with legal thought leaders.

Challenges Surrounding Social Media Discovery

By Josh Markarian | December 26, 2019 | 0 Comments

Social media has the potential to complicate cases from the first meeting with a client all the way through the delivered ruling. With the increasing popularity of social media across multiple platforms and devices, social media discovery is more likely to play a major role in litigation these days than not. Yet, despite its prevalence, there are still some very big challenges in using evidence from social media effectively during litigation. In are additional challenges.

IoT (Internet of Things) Snapshot

By Josh Markarian | December 23, 2019 | 0 Comments

Technology is connecting our lives like never before due to countless Wi-Fi enabled gadgets and thousands of mobile applications. The Internet of Things (IoT) is the ever-increasing network of devices that have their own IP address; think about your phone, smartwatch, GPS, tablets, Google Glass etc. Devices that were once standalone such as the thermostat, vehicle sensors, medical implants, alarm systems, and garage doors can now all be networked to the internet.

Biometric Information Privacy Act at a Glance

By Josh Markarian | December 19, 2019 | 0 Comments

The BIPA guards against the unlawful collection and storing of biometric information.

California Consumer Privacy Act (CCPA) Overview

By Josh Markarian | December 3, 2019 | 0 Comments

The California Consumer Privacy Act (CCPA) gives customers extensive new rights protecting their personal information. Under the new regulations business will need to publicly disclose their data sharing and privacy practices and give them the option to have their data cleared. One goal of this is to clear away unsolicited marketing and allow consumers the…

Controlling Your Data: Optical Character Recognition (OCR)

By Josh Markarian | November 29, 2019 | 0 Comments

Optical Character Recognition (OCR) is technology that aids in converting paper based documents, images and large volume repositories into electronically searchable and archival data. OCR can work with both hard copy data and digital information helping reviewers and teams boost visibility and control over their data.

Primer on Dark Data

By Josh Markarian | November 25, 2019 | 0 Comments

Dark Data is all of the “non conventional” sources for data that are commonly overlooked in discovery. Dark data can be unstructured and a lot of the time can be a daunting unstructured repository of information assets. These types of data are similar to big data and are also a part of the bigger whole…

ISO/IEC 27701 – About the New Privacy Information Management Standard

By Josh Markarian | November 19, 2019 | 0 Comments

ISO/IEC 27701 is an extention to the existing ISO/IEC security standards 27001 and 27002. ISO/IEC 27001 specifies a management system that is intended to bring information security under management control and gives specific requirements.

“Tagged” Social Media Photos are Within Scope of Discovery NY Appeal Court Ruling

By Josh Markarian | November 7, 2019 | 0 Comments

In Vasquez-Santos v. Mathew, 8210NIndex 158793/13 (N.Y. App. Div. Jan. 24, 2019), the New York Appellate Division, First Department panel “unanimously reversed” an order by the Supreme Court, New York County last June that denied the defendant’s motion to compel access by a third-party data mining company to plaintiff’s devices, email accounts, and social media accounts, so as to obtain photographs and other evidence of plaintiff engaging in physical activities and granted the defendant’s motion.

TERIS works with leading law firms and corporate legal departments. We provide sophisticated consultation-based solutions, state-of-the-art technologies and highly experienced project management.

Our Business Partners


relativity_logo small
Zapproved_Logo small
Nuix_company_logo small
logo_brainspace small