Webinar: An Ounce of Prevention: Fundamentals of Data Protection

Webinar: An Ounce of Prevention: Fundamentals of Data Protection For legal practitioners, a commitment to data protection is a matter of ethical duty, legal and regulatory compliance, and fundamental responsibility to clients and

Webinar: Threading the eDiscovery Needle: Achieving Efficient and Defensible Document Review

Webinar: Threading the eDiscovery Needle: Achieving Efficient and Defensible Document Review Document review is typically the most expensive phase of an eDiscovery project, with past studies attributing more than half of discovery

Webinar: Beyond the Four Corners: Evolving Electronic Documents

Webinar: Beyond the Four Corners: Evolving Electronic Documents The definition and boundaries of “document” are changing, as new source and file types proliferate and custodian behavior changes. New challenges like modern attachments,

Webinar: The Next Black Box: ChatGPT, LLMs, and Legal Technology

Webinar: The Next Black Box: ChatGPT, LLMs, and Legal Technology Generative AI applications like ChatGPT are suddenly everywhere, with companies announcing new integrations daily – including in the legal industry.  But what is

Webinar: Off-Channel Communications: Strategies and Best Practices

Webinar: Off-Channel Communications: Strategies and Best Practices Never have there been so many communication devices, apps, and services available for use by employees, and employees helping themselves to these options can create

Webinar: Cloud Watching: Strategies and Best Practices for Microsoft 365 Discovery

Webinar: Cloud Watching: Strategies and Best Practices for Microsoft 365 Discovery Microsoft 365 was already widely-used before 2020, and the rise of remote work since then has caused adoption and use of

Webinar: In the Beginning: Identification and Preservation Fundamentals

ESI spoliation remains a frequent issue – particularly in the gray area where new devices, applications, or services are transitioning from niche adoption to mainstream use. Hence the importance of these phases in an eDiscovery effort: almost every other type of failure can be fixed with adequate time and money, but once unique, relevant ESI is gone, it’s gone.

Webinar: Handling Data: Overcoming Differing and Often Contradictory National and International Legislation

Companies under investigation often find themselves in the unenviable position of trying to balance the need to provide prosecuting agencies with the information they request and staying on the right side of the myriad of data protection legislation across the world. Get it wrong and they can find themselves in further difficulty with the prosecuting agencies or staring down the barrel of a hefty data protection fine. What steps can practitioners and companies take to successfully resolve these conflicts in an effective and timely way?

Law Firm Cybersecurity in a COVID-19 World

It is no surprise that law firms continue to be an attractive target for cyberthieves. Law firm data systems hold various types of confidential information about corporate clients, and include nonpublic information about corporate development, business strategy and planned transactions that hackers could use for a variety of malevolent uses. In addition, firms generally also store a wealth of personally identifiable information, including protected health information and payment information, for clients, parties, witnesses, and employees. The dramatic shift to remote working due to COVID-19 has increased the complexity of the cybersecurity challenges firms face.