Part 2 of our off-channel blog series delves into adapting policies for modern communication platforms, stressing compliance and robust message archiving for effective data governance.
Our Blog
Thought Leadership and Industry Trends
Off-Channel Communications Still High on the SEC’s Radar
Although government agencies like the US Securities and Exchange Commission (SEC) acknowledge that communication platforms like WhatsApp and iMessage offer an easy and efficient way to conduct business and are here to stay, they are less than impressed with their...
Remote Employee Departures: Is Your Company Data Safe?
In the era of remote work, it’s easy for a departing employee to take valuable IP – intentionally or unintentionally – after termination. Before company information ends up in competitors’ hands, organizations should prepare for employee departures with data security top of mind.
Critical Considerations for Sensitive Information in a Data Breach
Mishandling sensitive information can lead to a data breach, a rising liability for organizations and individuals that can cost millions.
Prioritizing Data Security? Why You Need a Gatekeeper
In a conversation with CDS, Cody Breunig, privacy and digital forensics expert, discussed the importance of data protection and the role of a gatekeeper in ensuring the security of sensitive information at his organization.
Data Collection and Investigation: Balancing Security and Accessibility
Today’s expansive data source environments are much more complex, as is the regulatory environment driving decisions on compliance strategy. What steps can organizations take to prepare to handle the challenges of a dispersed, diversified data landscape in advance of any compliance requirement event?
How eDiscovery Software Accelerates Data Breach Response
After a data breach is discovered, notification becomes essential. Companies are under tremendous pressure to determine what data has been taken and who they must notify, sometimes in as little as 72 hours. That’s where eDiscovery expertise can make a key contribution.
When BYOD Backfires
BYOD policies allow employees to use personal devices to access the organization’s data in the pursuit of doing their jobs. Cost-savings and convenience aside, misunderstandings surrounding BYOD policies are driving a steady stream of litigation and investigations. Do the risks outweigh the benefits?
Conducting Remote Data Collections for eDiscovery in the Era of Social Distancing
COVID-19 has disrupted almost all normal business practices, making many activities challenging to handle virtually. Fortunately, eDiscovery can largely continue on pace, thanks to technology and remote collection workflows. Shifting to fully remote or socially distanced collections, whether to accommodate shelter-in-place orders or employee safety concerns, is achievable in most circumstances.
Managing Pre-Litigation Investigations for the Best Results
Long before starting formal discovery, an internal investigation should be launched so a party and their counsel can understand and assess the information ecosystem, identify sources of potentially relevant information and examine these sources via sampling. Although a litigant may not be required to produce the information found, it is crucial that pre-litigation investigation be handled appropriately to ensure it is accurate.
Google’s Disappearing Emails Impact eDiscovery and Document Retention
Email retention just got harder thanks to functionality introduced by Google for personal Gmail and GSuite users. With a nod to apps like WhatsApp and Signal which allow chats to disappear, Google is allowing its users to send confidential emails that are protecting with a passcode and will be deleted after a set period of time (aka ephemeral messaging).