Events and conferences can be a great resource for further developing your career, whether it be your goal is building your network, furthering your industry-specific education, or any number of other motivators. One benefit or byproduct of the shift towards more remote work across the legal industry is the increased number of online events, webinars, educational resources, and digital content being produced.Read More
In order for a forensic data investigation to be thorough and complete, forensic examiners need to have confidence that the collection didn’t miss any relevant ESI. While most ESI can be attributed to the usual suspects, natural complexities and unique case-specific challenges can often lead to data being found in more obscure areas.Read More
Custodian questionnaire’s and IT team interviews are valuable tools that help set the scope for the collection and discovery to come. It’s an important part of eDiscovery and information governance to implement data mapping best practices to ensure you’re collecting the right data, and that you’re not missing any potentially relevant ESI.Read More
If your organization has been looking for a clear and concise resource for cybersecurity guidance, the American Bar Association’s Cybersecurity Legal Task Force has you covered. They recently released the second edition of the Vendor Contracting Project: Cybersecurity Checklist, which is tailored to solo and small firm attorneys who interact with vendors that handle sensitive and confidential information.Read More
Looking for more eDiscovery and information governance content outside of your normal feed? Here are a handful of recent podcast episodes that are both funny, relevant and informative to provide some pleasure on your next commute, or whenever you have some time to spare.Read More
True ESI defensibility starts with maintaining the authenticity and privacy of the data from the moment it is collected all the way to hosting and later deletion. Data encryption provides the backbone for this security through concealing the data in a cipher, thus making it unreadable to anyone without the key.Read More
Officially referred to as House Bill 969, the bill which is more commonly known as Florida’s consumer data privacy bill marks an important shift in overall consumer data collection governance in the US.Read More
Following California’s implementation of the California Consumer Privacy Act (CCPA) which took effect on January 1st, 2020. The state is setting up the California Privacy Rights Act (CPRA) which is slated for January 1st, 2023.
The CRPA is an expansion beyond the CCPA, and will supersede it once the CRPA is fully effective. The key differences between California Privacy Rights Act (CPRA) & the California Consumer Privacy Act (CCPA) is the addition of the data minimization clause.Read More
At first glance social media may not seem it, but it is a major player in eDiscovery. From Facebook to TikTok, here are the top social media sites by the numbers.
Top 10 Social Media Sites Ranked by Monthly Annual Users (MAUs)Read More
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially transfer files via a computer network. There are various types of file transfer protocols but FTP is one of the more common methods used within the legal industry. FTP is typically secured through the attachment of SSL/TLS (FTPS).Read More