The concept of “Legal Hold” is not new in the least and long before anyone ever thought about electronic evidence (Electronically Stored Information- ESI) once a party became aware of potential litigation it had a duty to protect all relevant evidence, like paper documents. So it comes as no surprise
7 cyber risks using WiFi including risks of using free hotspots!
Every one is dependent on WiFi -unfortunately most people think it is safe, however Networkworld identified 7 “ways you could be giving away your identity through a Wi-Fi connection and what to do instead.” The November 13, 2015 report entitled “7 ways hackers can use Wi-Fi against you”…
Continue Reading 7 cyber risks using WiFi including risks of using free hotspots!
Will antitrust laws limit the Frightful 5 who dominate digital life?
The New York Times identified Amazon, Apple, Facebook, Google, and Microsoft as the “undisputed rulers of the consumer technology industry” in a January 20, 2016 article entitled “Tech’s ‘Frightful 5’ Will Dominate Digital Life for Foreseeable Future.” Don’t forget that Microsoft lost it antitrust lawsuit in 2000…
Continue Reading Will antitrust laws limit the Frightful 5 who dominate digital life?
Lawyers & Clients Need to Understand the Cyber Threats to the IoT (Internet of Things)!
Wired reported its 2016 Cyber Threats which included the comment that “anyone who follows cybersecurity knows that techniques get bolder and more sophisticated each year. The last twelve months saw several new trends and next year no doubt will bring more.” On January 1, 2016 Wired made its predictions of…
Is Google violating privacy laws in its use of K-12 student data?
A recent letter sent to Google from a US Senator expressed concern about the “extent to which Google may be collecting K-12 students’ personal data and using that information for non-educational purposes without parents’ knowledge or consent.” On January 13, 2016 Senator Al Franken sent a letter to Sundar Pichai…
Continue Reading Is Google violating privacy laws in its use of K-12 student data?
Supreme Court thinks proportionality will help eDiscovery, but not everyone agrees
In support of the 2015 Amendments to the Federal Rules of Civil Procedure Chief Justice John Roberts said that “Rule 26(b)(1) crystalizes the concept of reasonable limits on discovery through increased reliance on the common-sense concept of proportionality.” On December 31, 2015 the Supreme Court released the “2015 Year-End…
Continue Reading Supreme Court thinks proportionality will help eDiscovery, but not everyone agrees
Warning Issued about Legal Risks of Using Big Data
Most people do not appreciate what is meant by the term Big Data so the Federal Trade Commission (FTC) issued a report which highlights that “potential benefits to consumers are significant, but businesses must ensure that their big data use does not lead to harmful exclusion or discrimination.” On January…
Continue Reading Warning Issued about Legal Risks of Using Big Data
Cyberattacks on the Increase in 2015 with 102+ Million People Exposed in 315 Data Breaches!
The Identity Theft Resource Center (ITRC) “defines a data breach as an incident in which an individual name plus a Social Security number, driver’s license number, medical record or financial record (credit/debit cards included) is potentially put at risk because of exposure.” The ITRC December 31, 2015 Data Breach Reports…
eDiscovery Update – Lawyers Need to Embrace Business Intelligence (BI)
A recent IBM eBook points how that “in today’s competitive global marketplace, leading organizations are complementing their current approaches to business intelligence (BI) and analytics.” IBM’s eBook is entitled “Forward Looking Business Intelligence” and given the scope and volume of Electronically Stored Information (ESI) in litigation today the…
Continue Reading eDiscovery Update – Lawyers Need to Embrace Business Intelligence (BI)
Privacy Risks in Recycling eWaste
Once upon a time I bought a used hard drive at a computer resale shop which I needed for a patent infringement suit I was defending about software developed for a 1987 Apple Mac computer. The hard drive contained all of the client files for a well-known law firm in…