The Relativity Blog


Your single source for new lessons on e-discovery and the technology that powers it.

therelativityblog.com

Cyber Insurance 102: Everything Else You Wanted to Know

2017-07-27+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy

Cyber Insurance 102: Everything Else You Wanted to KnowSince our first cyber insurance post, serious breaches like WannaCry are making it clear that cyber insurance policies are moving from niche to mainstream.  

Vulnerability has become an onion of concern as organizations seek to protect not only their own sensitive data, but also any client data or system connections for which they may be a trustee, such as during e-discovery and other strategic solutions work.  

“Modern enterprises are becoming painfully aware that 100 percent cybersecurity is an impossibility,” says Judy Selby, an insurance and strategic cyber risk consultant. Instead of focusing exclusively on building cyber defenses, smart companies are taking an enterprise approach to managing cyber risks.”  

And for many, cyber insurance is a step in that direction. 

Read More »

Enfuse 2017: Handling Data Breaches and EnCase Joins the Relativity Community

2017-07-27+0000| | Collection, Community, Cybersecurity & Data Privacy

Enfuse 2017: Handling Data Breaches and EnCase Joins the Relativity CommunityThe Enfuse Conference, Guidance Software’s annual digital investigations event held last week in Las Vegas, featured the usual mix of legal, law enforcement, and computer forensics professionals.

However, the conference, known formerly as the Computer and Enterprise Investigations Conference, had a slightly different look this year. For instance, the hashtag #eDiscovery was the number one hashtag used on social media throughout the conference. (#DigitalForensics was second most popular, and #DataBreach was fourth.)

Why the importance of #eDiscovery?

Read More »

11 Tips for Securing Data in the Virtual Workplace

2017-07-27+0000| | Cybersecurity & Data Privacy

160513_FRONTEO_logo_H_RGB_Color.png

This article was originally published on the FRONTEO blog. It's a good collection of practical tips for keeping company data secure, so we wanted to share it here, as well.

Today’s highly mobile workforce requires easy access to data while traveling and working remotely. Providing that ease of access and supporting productivity while keeping data secure presents a balancing act for IT.

Read More »

5 Big Data Devices to Avoid If You're a Criminal

2017-07-27+0000| | Community, Cybersecurity & Data Privacy

052617-data-devices-to-avoid.pngIt’s a smart phone, a smart watch, a smart car, and even a smart oven. It’s the Internet of Things (IoT) and, unless you live under a rock, it’s taking over your life. (Even if you do live under a rock, Google Earth has probably captured a photo of you coming and going to forage for food.)

IoT is contributing significantly to big data—and often, that data is coming into the spotlight in the unending search for justice. Civilly, this means suits are settled or litigated with the benefit of emails, structured data, and social media evidence that can verify timelines and prove intent.

Read More »

New Data: Employee Data Habits May Increase Corporate Legal Risk

2017-07-27+0000| | In-house Counsel, Cybersecurity & Data Privacy

051017-employee-big-data-habits-and-employer-risk.pngThis article originally appeared on Law360.

In our daily work lives, we see a fair amount of anecdotal evidence indicating many of us engage in workplace behaviors that put our personal privacy and company data at risk.

But, how serious is the problem?

To find out, kCura recently commissioned a Harris Poll survey conducted between December 28, 2016, and January 18, 2017, included 1,013 U.S. adults age 18 and over who were employed full-time or part-time, working in a traditional office setting for at least 50 percent of the time (referred to as “employees” throughout) to get a better idea of just what employee behaviors may be putting corporate enterprises—and themselves—at risk.

Read More »

Underwriting e-Discovery Risk with ECA in the Insurance Industry

2017-07-27+0000| | In-house Counsel, ECA & Investigation, Law Firm, Cybersecurity & Data Privacy

Insurance02.pngOriginally published in early 2016, this post highlights some important considerations for professionals in an industry that helps protect our everyday economy. It continues to get attention today, so we're republishing it in case you'd like to take another look.

Property insurance keeps our business and personal lives afloat. The common risks we take to go about our everyday lives—the risk that our home will be burglarized, for example, or that we'll cause a car accident on our way home from work—could be catastrophic if we didn’t have policies in place to protect us from the consequences when those risks come to fruition.

Read More »

98 Percent of Employees Say Their Privacy Is Important to Them—But Is It? [Infographic]

2017-07-27+0000| | In-house Counsel, Cybersecurity & Data Privacy

041217-harris-poll-survey-feature-image.pngBetween Wikileaks, tech experts, and the Federal Trade Commission, we have no shortage of sources reminding us on an almost daily basis that the Information Age brings both invaluable new resources and technology, and a significant threat to personal privacy. Data is everywhere, and it’s accessible by more entities than ever—including employers.

To get to the heart of how employees understand data privacy and how their online behavior at work can impact it, kCura recently commissioned a survey conducted by Harris Poll among 1,013 US adults age 18 and older who were employed full-time or part-time, working in a traditional office setting for at least 50 percent of the time, and are not freelancers (referred to as “employees” throughout).

Read More »

Cybersecurity Regulation & You: Time to Become Part of the Solution

2017-07-27+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy, Litigation Support

040617-Cybersecurity-Regulation.pngSlowly but surely, law firms and e-discovery service providers are beginning to tackle cybersecurity risks. Firms are starting to appreciate that they're susceptible to the same privacy and data security concerns as other businesses and, as aggregators of confidential, protected, and sensitive data, they’re a high-value target for cyber criminals.

Nevertheless, many firms still consider cybersecurity a "should have someday"—as opposed to a "must have today"—goal. New York's Department of Financial Services (DFS), the state's financial regulator, has recently changed that thinking.

Read More »

SXSW 2017: Bats, Biometrics, and Solving Tomorrow’s Data Challenges

2017-07-27+0000| | Review & Production, Community, Education & Certification, Cybersecurity & Data Privacy

blog_SXSW-takeaways.pngEvery March, there are two great migrations to Austin, Texas. The first is the arrival of the city’s huge Mexican free-tailed bat colony, which spends the summer and fall living, breeding, and hunting in and around the Congress Street Bridge. When the colony’s newborn bat pups take wing in August, more than 1.5 million bats share the skies above the capitol city.

The second migration is generally considered to be much weirder. March in Austin also means South by Southwest, which for nearly 30 years has gathered the world’s finest creative minds in technology, music, and film to discuss wicked problems and innovate solutions across industries. The festival has been a launching point for apps like Twitter and Foursquare and hosted talks by tech developers and world leaders, including a 2016 appearance by Barack Obama.

Read More »

Cybersecurity 101: Protecting Law Firms from ‘Bad Actor’ Entry via Email Phishing

2017-07-27+0000| | Community, Cybersecurity & Data Privacy

blog_protect-from-bad-actor-entry-via-email-phishing.pngHeadlines have made no secret that law firms are at particular risk of cyber attacks, and their vulnerability comes from both a lack of preparedness and the simple fact that their troves of sensitive client information make prime targets for baddies.

Simplified e-discovery is often a positive consequence of strong cybersecurity policies and diligent data protection, and plenty of tools and techniques help bolster those upstream processes. Paul Everton, founder and CEO of MailControl—a company whose Enterprise Privacy ShieldTM software helps law firms and others increase security against the rising threat of spymail—recently shared his thoughts on these techniques with us.

Read More »
 

Get the Relativity Blog

Get The Relativity Blog

About the Blog

The Relativity Blog provides engaging e-discovery and legal technology lessons to a diverse audience of practitioners. Written by the team behind Relativity and the community that drives this industry, the blog is your go-to source for tangible takeaways, thought-provoking discussion, and expert insights into stories and technologies that can help you improve your day-to-day work.

Share Your Expertise

Want to be an author on The Relativity Blog? We’re always happy to feature readers.

Learn More