Some Things Don’t Need to be Discovered. Protect Sensitive Data in Discovery.

Today’s corporate information systems are awash with highly sensitive data. Whether it’s personally identifiable information (“PII”), personal health information (“PHI”), financial and payment information, intellectual property and trade secrets, source code—the list goes on—sensitive information exists in virtually every collection of data. Learn to protect this sensitive data from discovery.

A New Framework for Trans-Atlantic Data Transfers: The EU-U.S. Privacy Shield

On February 2, 2016, the European Commission and the U.S. Department of Commerce announced a new framework to govern the transfer of data from the EU to the United States, referred to as the EU-U.S. “Privacy Shield." The new protocol is intended to replace the 15-year-old Safe Harbor agreement that the European Court of Justice struck down in October, on the grounds that it failed to adequately protect the privacy rights of EU citizens.

Coming in 2016: Tougher New Data Privacy Rules in the European Union

European Commission and European Parliament officials last week agreed on a new set of data protection laws, intended to strengthen individuals’ privacy rights and create a more consistent set of regulations across the twenty-eight European Union member countries. Learn highlights of the new rules including provisions addressing many main points aspects of the European Union privacy rules.

Ripped from the Headlines: Automobile Cybersecurity and the Internet of Things

n Sunday night’s episode of the CBS television show CSI: Cyber, a hacker “cyber-jacks” automobiles—some empty, some with drivers behind the wheel—and uses them as remote-controlled cars to cause deadly crashes. As I watched the show, I couldn’t help but think back to my blog post earlier this year about the security vulnerability of our cars (and other devices we use every day) that are connected to the Internet of Things. Is the premise of the television show pure fiction? Exaggeration of a minor threat for dramatic effect?

“Deflategate” and Text Messages: e-Discovery Lessons

E-Discovery finds itself in the headlines of the mainstream media again. This time, the general public gets a chance to learn about the discoverability of text messages—and the potential consequences of evidence spoliation—thanks to Tom Brady and the “deflategate” scandal. (For those of you who don’t follow sports, “deflategate” refers to allegations that the New England Patriot’s quarterback played with deliberately deflated footballs in the team’s victory over the Indianapolis Colts in the AFC Championship.)