Webinar: Beyond the Four Corners: Evolving Electronic Documents The definition and boundaries of “document” are changing, as new source and file types proliferate and custodian behavior changes. New challenges like modern attachments,
Webinar: Off-Channel Communications: Strategies and Best Practices
Webinar: Off-Channel Communications: Strategies and Best Practices Never have there been so many communication devices, apps, and services available for use by employees, and employees helping themselves to these options can create
Webinar: Hold On: Get a Grip on Conducting Effective Legal Holds
Webinar: Hold On: Get a Grip on Conducting Effective Legal Holds In a world of new and evolving sources, conducting effective legal holds is more critical than ever. Done properly, legal holds
Webinar: What’s Next in Cybersecurity: Understanding Post-COVID Cyber Threats and Proactive Steps to Mitigate Them
Webinar: What's Next in Cybersecurity: Understanding Post-COVID Cyber Threats and Proactive Steps to Mitigate Them The COVID-19 pandemic has created a host of new cybersecurity and data privacy threats for organizations. Malicious
網路研討會: Disputes, Compliance, and Conduct Management
Webinar: Disputes, Compliance, and Conduct Management A number of regulators have recently issued statements which indicate that they will look more favourably on organisations who have pro-active and effective compliance regimes in
Discovery Challenges in Cross-Border Litigation and Investigations
Discovery Challenges in Cross-Border Litigation and Investigations By Drew Macaulay, Managing Director The need for multinational corporations to gather and review documents from different jurisdictions for investigation and litigation purposes is not
Case Study: Custom Engineering Enables Redaction of Documents for High-Profile IP Dispute
Custom Engineering Enables Redaction of Documents for High-Profile IP Dispute A large collection of documents needed redaction for a discovery deadline. Custom scripting of the redaction tools were developed, utilized, and allowed us
How to Prepare for the CCPA: Know Your Data
How to Prepare for the CCPA: Know Your Data Maureen O'Neill, Esq. In a highly globalized market where big data proliferation has run unchecked, organizations are increasingly vulnerable to mismanagement of their
Eye on Discovery – The EU-US Data Privacy Framework: Is It Our Destiny or the Dark Side?
The EU-US Data Privacy Framework: Is It Our Destiny or the Dark Side? “Oh, I’m afraid the deflector shield will be quite operational when your friends arrive.” With these words, the Emperor taunted Luke Skywalker,
Eye on Discovery – 11.5 Million Reasons for Law Firms to Take Data Security Seriously
Eye on Discovery - 11.5 Million Reasons for Law Firms to Take Data Security Seriously In early April, we bore witness to what may be the largest data breach in history: 11.5 million confidential
Eye On Discovery: The Eight Commandments of Data Preservation
Eye On Discovery: The Eight Commandments of Data Preservation Since the addition of the e-discovery amendments to the Federal Rules of Civil Procedure in 2006, sanctions for spoliation have risen markedly. This trend seems
The Snowden Effect – How the Landscape of Cross-Border Discovery is Impacted by Recent Events
Webinar: The Snowden Effect - How the Landscape of Cross-Border Discovery is Impacted by Recent Events Presented as part of the ALM Virtual Corporate Counsel Forum, this one-hour webinar, will examine how
Decoding Encrypted Documents in Cross-Border eDiscovery
Decoding Encrypted Documents in Cross-Border eDiscovery Successfully managing encrypted data depends on the processes and technology used. With the right know-how and technology, it is possible to properly collect and decrypt data and
Cracking the Code – how to handle encrypted data
Cracking the Code - how to handle encrypted data Image a hard disk today and it might well be unreadable, due not to inept removal or preservation but to encryption. Jonathan Fowler of
Encryption is Everywhere: A Practical Look at Steps to Consider
Encryption is Everywhere: A Practical Look at Steps to Consider Jon Fowler discusses data encryption and the problems it can potentially create for the eDiscovery process, as well as several techniques to approach
Digital guardians: Protecting companies against IP theft by John Shaw
Digital guardians: Protecting companies against IP theft by John Shaw May 2012 As technology becomes more sophisticated and the tracking of intellectual property (IP) theft becomes more challenging, the pressure is on IT
How Businesses Can Protect Themselves from IP Theft by John Shaw
How Businesses Can Protect Themselves from IP Theft by John Shaw February 2012 Software companies can spend enormous amounts of money and time developing new products; yet underestimate the ease of code being