Data security threats commonly occur due to a compromised privileged user. Cloud technology helps address this risk by controlling who has access to what.
There are two major categories of security features cloud vendors can offer to address threats. Technology and operations each contribute to data security.
Data security sits at the intersection of ediscovery data, cloud vendors and legal operations. Here are common security threats and how cloud vendors address them.
Mitigating risk is important to legal professionals regardless of their role or area of expertise. Many investigations involve sensitive data and serious allegations, all of…
The work doesn’t end after the legal team has issued a legal hold notice. Legal counsel has a duty to monitor custodians’ compliance with the…
This quick guide explains what ediscovery compliance requires and reviews some of the controlling rules, including the FRCP, HIPAA, and the GDPR.
Use our GDPR 60-day countdown checklist to develop a compliance plan that balances the GDPR’s requirements with your e-discovery obligations.
In this opinion, the appellate court soundly rejected the defendant’s arguments, affirming a daily $4,000 sanction for the defendant’s willful refusal to comply with discovery.
The impending General Data Protection Regulation (GDPR) will go live on May 25, 2018, protecting the personal data of European Union (EU) residents.
In this negligence case, the district court upheld the magistrate’s order requiring the defendant to provide electronic data (ESI) to the plaintiffs.
Get success tips from the three corporate e-discovery archetypes, based on attitudes: heroic Achievers, reactive Strugglers and disinterested Idlers.
In this illegal discrimination case, defendant Genpact avoids sanctions by issuing proper litigation holds and guiding custodians through ESI search.