Skip to content

Hidden Gold in Governance

Originally published by California Lawyer. by Susan Kuchinskas | May 2015 The discipline known as information governance has risen in visibility and application over the past year. And the bigger a law firm is, the more data it generates and stores-and must control and keep safe. Smaller firms may have more…

Legal Issues with Cloud Forensics

Originally published on Forensic Magazine. Unfortunately, many companies have entered the cloud without first checking the weather. Cloud services have skyrocketed primarily because they’re cheaper and more convenient than the alternative. What happens if the cloud gets stormy, you suffer a breach, and you find yourself in the position of having…

Thinking About Asking for More Discovery, Even After Disputes? Don’t Get Shut Down; Think Narrowly.

Originally published on ELL Blog. Authored By: Schawn-Paul Rotella Citation: Herron v. Fannie Mae, 1:10-cv-00943-RMC, (D.D.C. Feb. 2, 2015). e-Lesson Learned: Judges are human. When requesting discovery amid multiple discovery disputes, one’s requests should be narrow and specific. Otherwise, one risks the presiding judge’s cutting off all future discovery due…

New Malware Implodes on Detection, Taking Your Data Down

An insidious computer virus that reacts violently when detected—destroying everything onboard—is now on the loose. Researchers from Cisco Systems Talos Group discovered the malware threat, called Rombertik. Like many other threats, this one is made up of particularly virulent code attached to a seemingly innocuous email. The bug is designed…

Haut de page
Recherche