X

Blog Posts

NIST Release Privacy Framework – a Tool for Managing Risk

The National Institute of Standards and Technology (NIST) has just released version 1.0 of the NIST Privacy Framework; a new…

Assess Risk After a Breach – Including Security Breach Notification Laws By State

A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted…

5 Upcoming Legal Industry Conferences & Events

Here are five upcoming events in the legal industry to consider if you are looking to expand your industry knowledge,…

Challenges Surrounding Social Media Discovery

Social media has the potential to complicate cases from the first meeting with a client all the way through the…

IoT (Internet of Things) Snapshot

Technology is connecting our lives like never before due to countless Wi-Fi enabled gadgets and thousands of mobile applications. The…

Biometric Information Privacy Act at a Glance

The BIPA guards against the unlawful collection and storing of biometric information.

California Consumer Privacy Act (CCPA) Overview

The California Consumer Privacy Act (CCPA) gives customers extensive new rights protecting their personal information. Under the new regulations business…

Controlling Your Data: Optical Character Recognition (OCR)

Optical Character Recognition (OCR) is technology that aids in converting paper based documents, images and large volume repositories into electronically…

Primer on Dark Data

Dark Data is all of the "non conventional" sources for data that are commonly overlooked in discovery. Dark data can…

ISO/IEC 27701 – About the New Privacy Information Management Standard

ISO/IEC 27701 is an extention to the existing ISO/IEC security standards 27001 and 27002. ISO/IEC 27001 specifies a management system…