Everyone needs to review their cyberinsurance polices following the December 2015  “multi-billion dollar loss after hackers cut electric power to more than 80,000 Ukrainians last month,” Reuters reported that many publicly-traded utility companies “have warned of their exposure to cyber risks in their most recent annual reports to securities regulators

Continue Reading Read your Cyberinsurance policies closely since they may not cover your loses!

The concept of “Legal Hold” is not new in the least and long before anyone ever thought about electronic evidence (Electronically Stored Information- ESI) once a party became aware of potential litigation it had a duty to protect all relevant evidence, like paper documents.  So it comes as no surprise

Continue Reading eDiscovery Advice to IT – be on high alert to protect electronic evidence under “Legal Hold”!

The New York Times identified Amazon, Apple, Facebook, Google, and Microsoft  as the “undisputed rulers of the consumer technology industry” in a January 20, 2016 article entitled “Tech’s ‘Frightful 5’ Will Dominate Digital Life for Foreseeable Future.”  Don’t forget that Microsoft lost it antitrust lawsuit in 2000

Continue Reading Will antitrust laws limit the Frightful 5 who dominate digital life?

Wired reported its 2016 Cyber Threats which included the comment that “anyone who follows cybersecurity knows that techniques get bolder and more sophisticated each year. The last twelve months saw several new trends and next year no doubt will bring more.” On January 1, 2016 Wired made its predictions of

Continue Reading Lawyers & Clients Need to Understand the Cyber Threats to the IoT (Internet of Things)!

A recent letter sent to Google from a US Senator expressed concern about the “extent to which Google may be collecting K-12 students’ personal data and using that information for non-educational purposes without parents’ knowledge or consent.”  On January 13, 2016 Senator Al Franken sent a letter to Sundar Pichai

Continue Reading Is Google violating privacy laws in its use of K-12 student data?

In support of the 2015 Amendments to the Federal Rules of Civil Procedure Chief Justice John Roberts said that “Rule 26(b)(1) crystalizes the concept of reasonable limits on discovery through increased reliance on the common-sense concept of proportionality.”  On December 31, 2015 the Supreme Court released the “2015 Year-End

Continue Reading Supreme Court thinks proportionality will help eDiscovery, but not everyone agrees

The Identity Theft Resource Center (ITRC) “defines a data breach as an incident in which an individual name plus a Social Security number, driver’s license number, medical record or financial record (credit/debit cards included) is potentially put at risk because of exposure.”  The ITRC December 31, 2015 Data Breach Reports

Continue Reading Cyberattacks on the Increase in 2015 with 102+ Million People Exposed in 315 Data Breaches!

A recent IBM eBook points how that “in today’s competitive global marketplace, leading organizations are complementing their current approaches to business intelligence (BI) and analytics.”  IBM’s eBook is entitled “Forward Looking Business Intelligence” and given the scope and volume of Electronically Stored Information (ESI) in litigation today the

Continue Reading eDiscovery Update – Lawyers Need to Embrace Business Intelligence (BI)