The Relativity Blog

Your single source for new lessons on e-discovery and the technology that powers it.

SXSW 2017: Bats, Biometrics, and Solving Tomorrow’s Data Challenges

2017-03-28+0000| | Review & Production, Community, Education & Certification, Cybersecurity & Data Privacy

blog_SXSW-takeaways.pngEvery March, there are two great migrations to Austin, Texas. The first is the arrival of the city’s huge Mexican free-tailed bat colony, which spends the summer and fall living, breeding, and hunting in and around the Congress Street Bridge. When the colony’s newborn bat pups take wing in August, more than 1.5 million bats share the skies above the capitol city.

The second migration is generally considered to be much weirder. March in Austin also means South by Southwest, which for nearly 30 years has gathered the world’s finest creative minds in technology, music, and film to discuss wicked problems and innovate solutions across industries. The festival has been a launching point for apps like Twitter and Foursquare and hosted talks by tech developers and world leaders, including a 2016 appearance by Barack Obama.

Read More »

Cybersecurity 101: Protecting Law Firms from ‘Bad Actor’ Entry via Email Phishing

2017-03-28+0000| | Community, Cybersecurity & Data Privacy

blog_protect-from-bad-actor-entry-via-email-phishing.pngHeadlines have made no secret that law firms are at particular risk of cyber attacks, and their vulnerability comes from both a lack of preparedness and the simple fact that their troves of sensitive client information make prime targets for baddies.

Simplified e-discovery is often a positive consequence of strong cybersecurity policies and diligent data protection, and plenty of tools and techniques help bolster those upstream processes. Paul Everton, founder and CEO of MailControl—a company whose Enterprise Privacy ShieldTM software helps law firms and others increase security against the rising threat of spymail—recently shared his thoughts on these techniques with us.

Read More »

Everything You Wanted to Know About Cyber Insurance But Were Too Afraid to Ask

2017-03-28+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy

blog_everything-you-wanted-to-know-about-cyber-insurance.png“Hoping for the best, prepared for the worst, and unsurprised by anything in between.” Maya Angelou

Businesses are advised to insure themselves against all sorts of dangers, however unlikely. Cybersecurity has joined the ranks of acknowledged business vulnerabilities. That vulnerability is particularly strong among corporations who house confidential customer data as a matter of course, like health providers—and it’s also top-of-mind for law firms, who often hold their clients’ most sensitive business and personal information.

Read More »

5 Tactics to Improve Your Security in 2017

2017-03-28+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy

blog_security-tips-security-bill.pngThere are few modern catastrophes more frightening to today’s corporation than a data breach. When critical data is compromised, everyone suffers: employees, customers, CEOs, and legal teams must all face the consequences.

Fortunately, even as would-be hackers with ill intent get smarter, technology is getting smarter, too. There are ways for every organization to protect themselves against threats, cyber and otherwise.

Read More »

Murder, Data Privacy, and the Internet of Things

2017-03-28+0000| | Legal Update, Law Firm, Cybersecurity & Data Privacy

blog_amazon-echo-case.pngWhen James Bates, Owen McDonald, and Victor Collins began an evening of football, drinking, and hot tubbing on November 21, 2015, they probably had no idea they were on the verge of making new law in the expanding specialty of data discovery.

However, by the following morning, Collins was dead and Bates was in the crosshairs of a police investigation. The Bates home being somewhat typical in the era of the Internet of Things, it included a device known as an electronic home assistant. Thus, a fundamental legal question soon arose: is it lawful for police to seize and examine data from an Amazon Echo?

Read More »

e-Discovery Star Wars, Episode II: Defending your Galaxy

2017-03-28+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy, Litigation Support

122016-rogue-one-part-2.png"Plug in. He should be able to interpret the entire Imperial computer network." – Obi-Wan Kenobi, speaking about R2-D2 seconds after accessing a “secure” Death Star control room

In our last post inspired by the release of Rogue One: A Star Wars Story, we looked at how lessons from the Star Wars films reveal three key ways that every organization can better secure themselves against modern cyber threats: don’t be arrogant, keep an active imagination, and create a culture of security. William Lederer, chief security officer at kCura (respectfully and affectionately known as “Security Bill”) helped provide some insights into how these tactics can impact an organization’s security strategy.

Read More »

e-Discovery Star Wars, Episode I: 3 Ways to Secure an Empire

2017-03-28+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy, Litigation Support

120916-rogue-one.pngIt’s here. The next film in the Star Wars universe—Rogue One: A Star Wars Story—is on the verge of release. This post won’t contain spoilers, but previews have announced that Rogue One will set the stage for the original Star Wars film (Episode IV: A New Hope), following a band of rebels whose mission is to steal the secret plans for the Death Star.

There are many opportunities to find connections between Star Wars and e-discovery. In fact, Princess Leia is originally introduced as a “custodian” of stolen plans, and the first words spoken to Darth Vader on screen describe a digital forensics investigation: “The Death Star plans are not in the main computer.”

Read More »

Is Your Organization Vulnerable to a Cyber Attack? 3 Steps to Put Your Mind at Ease

2017-03-28+0000| | In-house Counsel, Cybersecurity & Data Privacy

120116-cybersecurity-fest.pngWhen PwC’s Doug Bloom and Anthony Moeller convened at Relativity Fest in October for their session e-Discovery in Cyber Investigations, they didn’t mince words. Cybercrime might be old news, but preventing it from happening hasn’t gotten any easier.

Ideally, any kind of breach is going to be prevented—but that perfect world doesn’t exist,” said Anthony. “Most companies have been hacked or will be hacked.”

Not exactly an uplifting message, but all hope is not lost. Throughout the session, Anthony and Doug focused on a few ways you can mitigate the risks of experiencing these attacks.

Read More »

Three Lessons on Digital Threats (and 4 Bonus Tips from a New IG Playbook)

2017-03-28+0000| | Information Governance, In-house Counsel, Cybersecurity & Data Privacy

112916-ig-playbook.pngWhat are the common gateways to cyberattacks? What are the risks associated with the Internet of Things (IoT)? What steps can an organization take to address personal cloud applications and other digital age threats?

These were just a few of the key questions that a panel of legal technology experts considered during the Relativity Fest 2016 session entitled The New IG Playbook for Addressing Threats from Personal Clouds, Cyber Attacks, and the IoT. Joining me for the discussion were Judy Selby, managing director of technology advisory services for BDO Consulting; Darin Sands, who chairs the Privacy and Data Security and eDiscovery Practice Groups at Lane Powell PC; and Donald Billings, manager of litigation and practice support at Sidley Austin.

Read More »

Do You Know These Crucial Ways to Combat Insider Data Threats?

2017-03-28+0000| | In-house Counsel, ECA & Investigation, Cybersecurity & Data Privacy

091516-Insider-Threats.pngIt might be difficult to count the number of eyes that see your company’s most sensitive and critical information on a daily basis. Often, having insight into that data is a necessary part of your employees’ day-to-day work. The thought is unsettling, but there is a real threat that people inside your organization might ultimately bring this knowledge with them to their next roles in competing organizations. So if you’re not sure whether employees may be abusing their access to cruicial company data, now is the time to get on top of it.

Fortunately, regular data analysis can help you identify leaks and prevent their consequences from coming to fruition. Here’s how your legal and compliance teams can get ahead of the risk.

Read More »

Get the Relativity Blog

Get The Relativity Blog

About the Blog

The Relativity Blog provides engaging e-discovery and legal technology lessons to a diverse audience of practitioners. Written by the team behind Relativity and the community that drives this industry, the blog is your go-to source for tangible takeaways, thought-provoking discussion, and expert insights into stories and technologies that can help you improve your day-to-day work.

Share Your Expertise

Want to be an author on The Relativity Blog? We’re always happy to feature readers.

Learn More