All Articles
Technology
The Ethical Hacker: Field Notes: Leveraging IoT Data Isn’t a Budget Killer
Like many, I attended LegalTech Jan. 31 – Feb. 2 and enjoyed catching up with old friends while seeing new, emerging technologies. Did you see the car forensics kit being offered by Berla? That was pretty cool and something I am definitely going to keep an eye on. One of the things I...
Read MoreCybersecurity
5 Tips to Help Mitigate Insider Theft: It starts with defining the line between personal and corporate information
Information is an extraordinarily prized corporate asset. In today’s digital age, that information is stored electronically. For example, software companies store their highly valuable intellectual property in code repositories. Healthcare companies store personal medical records in an...
Read MoreTechnology
The Ethical Hacker:
Like many, I attended LegalTech Jan. 31 – Feb. 2, enjoyed catching up with old friends, and seeing new, emerging technologies. Did you see the car forensics kit being offered by Berla? Wow, that was pretty cool and something I am definitely going to keep an eye on. ...
Read MoreDiscovery
The Ethical Hacker: Data, Disputes, Discovery and more...I Got 99 Problems, But No Data Ain’t One
A few weeks ago, I was lucky enough to meet with some senior in-house counsel from a Fortune 10 company. We were discussing data and the powerful ways analytics can be used in litigation. One of the attorneys appeared somewhat dismayed, saying that while analytics are amazing and she really wanted...
Read MoreCivil Justice
FRCP: Playing by the New Rules – Amendments driving predictability and proactivity
Introduction: The amended Federal Rules of Civil Procedure went into effect a little over a year ago now, and experience and case law are growing. We checked in with three experts who bring differing on-the-ground vantages to discovery practice and procedure: Hon. Mitchell D. Dembin, a U.S....
Read MoreTechnology
BYOD Brings Both Risks & Rewards: Considering the information governance implications of BYOD programs
As companies work to control costs and mitigate risk, bring your own device (BYOD) programs create as many questions as solutions. Employees are looking for faster and more fully integrated mobile devices – while corporate law and IT departments work to control costs, mitigate risk and to...
Read MoreTechnology
IoT Data: Objective, Consistent & Pervasive: Using metadata to build compelling narratives for litigation
Your phone records who you call and text, what websites you visit, and when you are active or asleep. Your fitness tracker records your heart rate and pace. Your GPS records your location, direction and speed. All of this is IoT data and has three critical characteristics: It’s objective...
Read More