Privacy

Minimizing Risk in Separation of Employment

We are living in an age of unprecedented layoffs, work stoppages, downsizing, and general unemployment. I frequently call out weak corporate termination policies/protocols during discovery health assessments. It is a complicated process with many players, data sources and heightened emotions. Most people hate confrontations or making a scene. Any fuzziness in your separation protocols may result in former employees walking away with corporate data [...]

Separation of Employment: Risk Assessment Workflow

Session workflow or check list to review separation of employment policies and protocols from a discovery readiness perspective. This is not actual policies or protocols. Instead, it is an extended bullet list of separation scenarios to consider and decision elements that your policies/protocols should cover. Every work environment has unique data systems, business models, risks and corporate cultures that must be considered when developing [...]

PII in Your Discovery?

Epiq’s “Ruyk” ransomware attack in February cut off customer access to their hosted discovery matters for roughly three days. This outages constitutes a major service interruption and violation of normal Service Level Agreements for one of the largest global legal service providers. Beyond SLA penalties, missed production deadlines and unhappy customers, Epiq is now facing a potential class action suit under the new California [...]

By |2020-08-03T17:20:38-05:00August 3rd, 2020|Provider, News, Privacy, Security, ESI Sources|0 Comments

Are You an ESI Hoarder? Discovery Lessons from the Big Tech Hearings

How long should you keep ad hoc internal communications? That is the question that bubbled up while listening to the four Big Tech CEO’s trying to explain a few of their 1.3 million emails and internal documents obtained by the House Antitrust Subcommittee's investigation that kicked off June 2019. The vast majority of those exhibits dated from 2010-2012 M&A strategy discussions. We have no [...]

My Take on O365’s Insider Risk Management

The headline got me excited that this new MSFT O365 package might enable my clients to better monitor policy and data management compliance. The reality seems pretty weak. Agentless monitoring of desktop and MS Edge actions such as downloads, forwards to banned domains, etc. We have been able to see those in logs for years and to create custom log based alerts. The new [...]

How to Offend Your Hosts During An Interview

Back at LTNY in February I put the word out that I was going to relaunch eDiscoveryJournal.com.  I pushed back briefings, webinars and interview requests with the “when it is live” excuse.  When Joe Bartolo and Bard Schaffel asked to interview me for their  EDRM podcast series, I ‘thought’ that surely I would have the new site live by then.  So most of you [...]

By |2019-05-14T09:47:54-05:00May 13th, 2019|Analytics, Essay, Privacy, Academic, Market|0 Comments
Go to Top