We help customers find fresh thinking on information intelligence. Browse our eDiscovery blog, case studies, webcasts, and more.
August 25th, 2017
The ongoing saga of the HBO data hack demonstrates the challenges of protecting the myriad types and locations of sensitive data in today’s digital environment. With data breaches happening more often, and with every type of business at risk, companies must go beyond standard InfoSec practices to identify and protect sensitive data. The HBO hack and other similar breaches demonstrate that, despite the increased focus on data security, it still isn’t enough.
August 14th, 2017
As volumes of electronically stored information increase, more and more sensitive data finds its way into ESI collected for legal matters, and it’s becoming increasingly difficult for organizations to effectively protect sensitive data in discovery. We explore some specific measures to protect sensitive data that can be incorporated into e-discovery project workflows. Learn how to find it, cull it, and protect your client's or organizations's sensitive data in e-discovery.
July 31st, 2017
With all this attention, shouldn't we assume that every organization subject to the GDPR—which is quite a broad group—is diligently preparing? After all, the GDPR goes into effect in May 2018, less than a year from now. Is your organization going to be compliant before the GDPR regulations take effect?
July 11th, 2017
Are you prepared for the GDPR compliance? The General Data Protection Regulation goes into effect in less than a year, May 25, 2018. Don't worry, Maureen has gathered some of the most helpful GDPR resources published by law firms to help align your organization with GDPR compliance.
Some InfoSec Guidance for In-House and Outside Counsel: ACC Issues its “Model Information Protection and Security Controls”
June 30th, 2017
Previously, we’ve explored the ever-increasing information security risks faced by law firms, which hold some of their clients’ most sensitive and confidential information. This week, one of the world’s largest and most respected law firms fell victim to a ransomware attack, shutting down its entire computer network system for several days. The Model Controls address thirteen areas of security measures which are designed to serve as a list of baseline security measures that corporate counsel may consider requiring its outside law firms to implement.