article thumbnail

Axis Insurance Company v. American Specialty Insurance & Risk Services, Inc. (N.D. Ind. 2021)

eDiscovery Law

Key Insight: Plaintiff’s Motion to Compel sought missing documents and communications from, and the correction of metadata “issues” from Defendant and its parent company (via third party subpoena), and sought an award of attorney’s fees and costs.

article thumbnail

The Cost of Non-Compliance: Financial Implications of Inadequate Legal Holds

Gimmal

Financial Risks of Inadequate Legal Holds The financial risks of inadequate legal holds are manifold, and they can significantly impact a company’s bottom line. The cost of such outcomes can be staggering, not just in terms of immediate financial payouts but also in long-term reputation damage and increased insurance premiums.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data security: Why a proactive stance is best

IBM Big Data Hub

Such mobile devices increase risk because they are authenticated and authorized in different ways and introduce new endpoints that need protection from cyber threats. Use dedicated data security software. Ensuring that permissions are removed when no longer needed lessens the security risk. Manage third-party-related risks.

article thumbnail

UAE: Federal level data protection law enacted

DLA Piper Privacy Matters

It’s not clear yet if this requires that each and every individual who may have access to a particular data set must be listed, or if it is sufficient for a category of employees or the team that has access to be named. Data protection officers (“ DPO ”). Data breaches. Data protection impact assessments (“DPIA”).