article thumbnail

Data Preservation: Don’t Treat Discovery Like It’s 1999

IG Guru

Two recent decisions highlight the importance of preserving relevant data, including text messages, as soon as litigation is anticipated. The post Data Preservation: Don’t Treat Discovery Like It’s 1999 appeared first on IG GURU. In both cases, courts imposed harsh sanctions […].

article thumbnail

Four Tips for Successful Meet and Confers

eDiscovery Daily

The purpose of the meet and confer is to discuss litigation details such as data preservation, privilege issues, the form of production, and expenses. To get the ball rolling, counsel can prepare a list of general questions: What data types need to be collected? The client’s IT environment must be understood as well. Raether Jr.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Off the Record: Texting

The Texas Record

You may have seen our recent blog post on Senate Bill 944 , which basically states that any public business conducted on a personal device is indeed a government record. A government employee multitasking by conducting government business on multiple devices. A government employee using an encrypted texting service.

article thumbnail

Ready for In-Depth eDiscovery Training? Head to Georgetown: eDiscovery Best Practices

eDiscovery Daily

There’s also Authentication and Admissibility, Forms of Production, Preservation and Sanctions and Technology-Assisted Review (“TAR”) for eDiscovery. Even Mobile Data Preservation, Rule 502 and Ethics. Once again, it is coming up in just over a month. And, if you hurry, you can save on registration! So, what do you think?

article thumbnail

Data security: Why a proactive stance is best

IBM Big Data Hub

Closely related to data security and an integral part of taking a proactive stance toward it is data privacy , or how data is stored, accessed and secured against improper access, theft or other loss. A comprehensive data security strategy includes people, processes and technology. Where do data breaches originate?

article thumbnail

UAE: Federal level data protection law enacted

DLA Piper Privacy Matters

The United Arab Emirates (“UAE”) has enacted its long awaited federal level data protection law. 45 of 2021 on the Protection of Personal Data Protection (“ PDPL ”), which was issued on 26 September 2021. The Data Protection Office. This article examines some of its key features. Definitions. Exceptions.

article thumbnail

U.S. Senators Introduce Bipartisan Bill on Reporting Critical Infrastructure Cyber Incidents and Ransomware Payments

Hunton Privacy

All entities subject to these requirements would face data preservation obligations. The Director of the CISA, in consultation with the heads of other federal agencies, would be charged with promulgating rules to implement these reporting and data preservation requirements. For more information, read the Bill here.