Privacy

Employer Policies Requiring Vaccination

Now that vaccines are approved and in the pipeline it is time for employers to decide whether they will be required for all or certain workplace employees. I hope that these December 16, 2020 EEOC Guidelines will be more consistent than previous CDC and other workplace COVID-19 guidelines. So far, corporations continue to face potential liability relating to their safety policies/practice. Now they have [...]

By |2020-12-28T11:49:53-06:00December 28th, 2020|Regulations, News, Compliance, Privacy|0 Comments

Solargate: A Global Trojan Horse in the Supply Train

Good summary and perspective by Doug. First a bit of context and techno translation. The Orion Platform is SolarWinds’ primary systems management bundle for on-premise and hybrid environments. SolarWinds’ products cover the breadth of IT management. That means the hacked version of Orion gave the hackers potential access to servers, applications, databases, storage and more. I have struggled to keep up with the new [...]

By |2020-12-17T11:27:47-06:00December 17th, 2020|News, Compliance, Privacy, Security, Architecture|0 Comments

Who is Selling eDiscovery Peer Contact Info?

NOTE: Although this is a real email thread, it does not contain my usual technical, process or market perspectives. Instead, I got tired of the barrage of emails offering me YOUR contact information, so I decided to expand my usual Request to be Forgotten and run down exactly whom was selling this 'global eDiscovery contact list'. Enjoy. Angela, After not receiving a response multiple [...]

By |2020-12-16T11:56:36-06:00December 16th, 2020|Essay, Privacy|0 Comments

Label Trade Secrets to Protect Them

The matter and article highlight the increased risk that corporate trade secrets and confidential data may be disclosed by the largely remote corporate workforce. I appreciate the well-structured guidance and concrete action steps proposed. The authors recommendation to perform an IP audit is a good starting point. However, I would add the need for automated categorization solutions that flag and highlight files and communications [...]

The Civil Discovery Impact of 50,000+ Smart Phone Extractions

Good find by Doug (who credits his wife) on Upturn.org’s new report on the widespread use of Mobile Device Forensic Toolkits like Cellebrite or Access Data by law enforcement. Aside from the civil liberties issues, I want to draw corporate litsupport/compliance/security attention to the logical progression that looms. The latest Gallup poll shows that 58% of employees work remote sometimes or always. I can [...]

Does Your BYOD Policy Cover Device Upgrades and Disposal?

Back in 2014 I wrote a piece on how Avast! pulled personal information from wiped Android phones sold on eBay to demonstrate the dangers of selling off your old smart phone. Now it seems that trading in your iPhone with Apple has not been safe since 2015. The improvements in device encryption may severely limit the potential exposure of corporate email, texts and credentials [...]

Connectors are Key to Unified Data Management

Many years ago as a product manager at Symantec (now Veritas again), I advocated for the acquisition of Globanet because they were a key partner in so many of our compliance-eDiscovery deals. The Veritas Compliance Portfolio covers the core enterprise unstructured data sources (file shares, Office365, Box, Exchange, SharePoint and many more) with a variety of solutions. Their eDiscovery Platform even does remote laptop [...]

Time to Update Your WhatsApp Usage Policy Again

When is a business chat a record? That question has plagued my consulting practice since I first collected and processed native email for a client back in 1993. Now your policies, protocols and security controls have to address multiple chat apps that support ‘vapormail’ disappearing messages. WhatsApp adds this capability to over 2 BILLION users. When you add FaceBook, Instagram, Signal, Viber and WeChat [...]

Preserving the Context of Privileged Communications

The article is a long and rather scholarly coverage of the evolution of the communication privilege. It brings up a couple interesting issues for retention policies and classification systems. First is the need to retain the actual communication wrapper for legal work product to preserve privilege. The proliferation of online meetings, chat and collaboration channels are generally considered informal communications and not addressed by [...]

By |2020-09-14T12:41:08-05:00September 14th, 2020|Caselaw, Analytics, News, Privacy, Content Management, Review|0 Comments
Go to Top