Considerations During the Identification Stage of the EDRM
During the Identification Stage, the goal is to create and deploy a plan to identify, preserve, authenticate, and collect relevant…
During the Identification Stage, the goal is to create and deploy a plan to identify, preserve, authenticate, and collect relevant…
In recent years the information requests from Law Enforcement have been rising dramatically, with the majority of these requests either…
Published nearly a year ago, the American Bar Association's "Law Firm Guide to Cybersecurity" is more relevant than ever. Cybersecurity…
Events and conferences can be a great resource for further developing your career, whether it be your goal is building…
In order for a forensic data investigation to be thorough and complete, forensic examiners need to have confidence that the…
Custodian questionnaire's and IT team interviews are valuable tools that help set the scope for the collection and discovery to…
If your organization has been looking for a clear and concise resource for cybersecurity guidance, the American Bar Association's Cybersecurity…
Looking for more eDiscovery and information governance content outside of your normal feed? Here are a handful of recent podcast…
True ESI defensibility starts with maintaining the authenticity and privacy of the data from the moment it is collected all…
Officially referred to as House Bill 969, the bill which is more commonly known as Florida's consumer data privacy bill…