article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. Department of Homeland Security (DHS) held public briefings about an attempt by a state-sponsored Russian hacking group to target control systems for U.S. electrical grids and power plants. 5) Alerting.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. And although we have seen ample evidence that computers are faster than humans, speed may not always equate to accuracy. The proportionality issue is an important one. So, what do you think? How would you define TAR?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Three

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. In the book we wrote as a follow up to our ABA TechShow session (Electronic Discovery for Small Cases (ABA, 2012), Bruce Olson and I listed several, including: Acrobat Legal Edition: adobe.com.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Two: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Ralph calls it the multi-modal approach: a combination of people and computers to get the best result. In short, analytics are the individual tools. TAR is the process you use to combine the tools you select.

article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Six

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Information governance thus became a very complicated legal analysis problem and building an IG policy around this “records life-cycle” paradigm to reflect those requirements might have made sense in a paper world.

IT 31
article thumbnail

Tom O’Connor of the Gulf Coast Legal Technology Center: eDiscovery Trends 2018

eDiscovery Daily

They understand that there’s some computer technology in play. First of all, I think you have to do a deep analysis what, if any, touches you have doing business in any way, shape or form at even the advertising level in Europe. Which has been great – I love doing the webinars that you and I do together.

GDPR 39
article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. 252,796,762 known records breached in 126 newly disclosed incidents Welcome to this week’s global round-up of the biggest and most interesting news stories.