Insights2020-05-19T12:04:21-04:00

EMPLOYERS HAVE DUTY TO PROTECT PERSONAL DATA OF EMPLOYEES

Are you adequately protecting your employees’ sensitive personal and financial data? The Pennsylvania Supreme Court recently ruled that an employer owes a “duty to exercise reasonable care to protect” employees against an unreasonable risk of harm arising out of the [...]

Tags: |

COURT-COMPELLED DECRYPTION OF SEIZED SMARTPHONES AND OTHER ELECTRONIC DEVICES

Does the Fifth Amendment privilege against self-incrimination provide grounds for a defendant to refuse to decrypt a smartphone, hard drive or other device which was seized by law enforcement under a valid search warrant?  Recent cases suggest that Fifth Amendment [...]

Tags: |

WHY AREN’T YOU USING TWO-FACTOR AUTHENTICATION?

As more of our daily tasks, purchases, and communications involve being logged into an online service - and as more of our data is at risk of theft and misuse because of it - the level of security required to [...]

TECHNOLOGY ASSISTED REVIEW (TAR 2.0) IN ACTION – ANALYTICS ENABLES ATTORNEYS TO REVIEW THE RELEVANT DOCUMENTS EARLY, IN RAPID RESPONSE TO A GOVERNMENT SUBPOENA

bit-x-bit Uses Analytics to Assist Law Firm’s Rapid Response to Government Subpoena Technology Assisted Review (TAR) is a method of review that uses algorithms and artificial intelligence to identify potentially relevant documents based on reviewer input. As a reviewer identifies [...]

Tags: |

THE SEDONA CONFERENCE ADDRESSES DISPOSITION OF DATA AND SEEKS PUBLIC COMMENT

The Sedona Conference, a non-profit research and educational institute dedicated to the advanced study of law and policy in the areas of antitrust law, complex litigation, and intellectual property rights, now provides guidance on the disposition of physical and electronically [...]

Tags: |

GETTING IP ADDRESSES AND SUBSCRIBER INFORMATION INTO EVIDENCE – NEW PENNSYLVANIA APPELLATE COURT RULING

Lawyers often obtain, through subpoenas, the IP addresses from an internet service provider (“ISP”) in the hope that they will lead to identifying an ISP’s user-subscriber, who allegedly hacked into a web mail account or device.  Once IP addresses are [...]

Tags: |

 

Go to Top