4 Ways to Implement Privacy as a Service: You Don’t Have to Do It Alone

By: Naheed Bleecker, Director of Cybersecurity and Governance Did you know you can operationalize your privacy policies without extra training, staff, or headaches? The onslaught of privacy regulation has been relentless, both internationally and in the United States. Due to the absence of a national privacy law, individual states have been passing laws that will go into effect in 2023: … Read More

Ephemeral Messaging – Understanding Key Preservation Issues in Civil Litigation

Consider the following scenario. You are presiding over a business litigation dispute where a representative for one of the parties regularly communicates by text message with counsel. Counsel has repeatedly advised the client representative (“client”) to stop sending messages and stick to email for written communications. The client—a younger lawyer and counsel’s primary in-house contact—is apologetic, but persists on texting … Read More

Top 5 Litigation Roadblocks in M365

When talking with our customers about discovery, specifically Microsoft Office 365 (M365), it becomes apparent that the rush to M365 during the pandemic introduced new speed bumps and roadblocks into their processes. Most organizations are unaware of the constraints of the M365 ecosystem and the major issues that can arise when doing discovery activities.  Many issues exist in the content … Read More

Navigating Social Media Discovery: Steps Counsel Can Take to Address Mass Deletion of Social Media History

Navigating Social Media Discovery: Steps Counsel Can Take to Address Mass Deletion of Social Media History

Philip Favro, Consultant, Information Governance & eDiscovery, Innovative Driven Helen Adams, U.S. Magistrate Judge, Southern District of Iowa Leslie Behaunek, Litigation Partner, Nyemaster Goode “How many Facebook friends do you have?” You’ve probably heard this question before, usually followed by advice on how to get more social media followers. The whole point of social media seems focused on getting “more” … Read More

How to remediate a rushed M365 Implementation Post Pandemic

During the unprecedented global pandemic that hit the world in early 2020, companies had to almost immediately shift from office-based work to remote work environments. During this time, most companies deployed Microsoft 365 platforms with licenses that included a robust array of collaborative tools geared toward productivity for remote workers. “In 2020, there were 95 million Teams users,” said Jeff … Read More

New Cases Spotlight eDiscovery Trends on Possession, Custody or Control and Jury Instructions re ESI Spoliation

Phillip Favro, Consultant, Information Governance & eDiscovery New eDiscovery cases continue to proliferate, spotlighting key trends regarding the handling of ESI in litigation. Two particularly noteworthy topics include: (1) Possession, custody, or control questions involving employee text messages; and (2) the role and form of adverse inference instructions to juries to address ESI spoliation. Understanding how courts are addressing these … Read More

Privacy Beyond Regulatory Compliance

Three trends apply pressure to today’s privacy programs: Increased consumer awareness Regulatory landscape becoming more complex Data & technology landscape is evolving Increased customer awareness As a customer, who doesn’t seem concerned about privacy today?  Maybe it’s due to the frequency of data breaches headlining the news, or perhaps it’s the fact that many customers find it creepy that a … Read More

Law and Legal services concept. Lawyer working on wooden table office. law interface icons. Soft focus.

Solving the Privilege Conundrum

by Philip Favro, IG & eDiscovery Consultant, Innovative Driven, with Practical Law Litigation This document is published by Practical Law and can be found at: us.practicallaw.tr.com/W-001-3978 Request a free trial and demonstration at: us.practicallaw.tr.com/about/freetrial Safeguarding privileged information remains a difficult proposition in civil litigation given the ongoing proliferation of electronically stored information (ESI) among organizations and individuals. Because of the … Read More

Privacy Happenings – April 2022

In Case You Missed It:  This Month’s Privacy Topics Sanity: Implement a Privacy Framework For privacy professionals attempting to implement privacy and data security programs, it’s a tumultuous journey.  Existing regulatory requirements are changing – consider the amendments made to the CCPA by the CPRA and those recently passed for the VCDPA.  New US state or country laws continue to … Read More

How to Build a Sound Data Security Plan: 5 Key Principles

By Linda Coniglio, Director of Privacy and Information Governance Most organizations keep sensitive personal data such as names, Social Security numbers, credit card, or other account data in unstructured data sources — considered by many the least protected data sources in an organization.  This sensitive personal data is often necessary to fill orders, meet payroll, or perform other business functions.  … Read More