The Relativity Blog


Your single source for new lessons on e-discovery and the technology that powers it.

therelativityblog.com

New Data: Employee Data Habits May Increase Corporate Legal Risk

2017-05-26+0000| | In-house Counsel, Cybersecurity & Data Privacy

051017-employee-big-data-habits-and-employer-risk.pngThis article originally appeared on Law360.

In our daily work lives, we see a fair amount of anecdotal evidence indicating many of us engage in workplace behaviors that put our personal privacy and company data at risk.

But, how serious is the problem?

To find out, kCura recently commissioned a Harris Poll survey conducted between December 28, 2016, and January 18, 2017, included 1,013 U.S. adults age 18 and over who were employed full-time or part-time, working in a traditional office setting for at least 50 percent of the time (referred to as “employees” throughout) to get a better idea of just what employee behaviors may be putting corporate enterprises—and themselves—at risk.

Read More »

Underwriting e-Discovery Risk with ECA in the Insurance Industry

2017-05-26+0000| | In-house Counsel, ECA & Investigation, Law Firm, Cybersecurity & Data Privacy

Insurance02.pngOriginally published in early 2016, this post highlights some important considerations for professionals in an industry that helps protect our everyday economy. It continues to get attention today, so we're republishing it in case you'd like to take another look.

Property insurance keeps our business and personal lives afloat. The common risks we take to go about our everyday lives—the risk that our home will be burglarized, for example, or that we'll cause a car accident on our way home from work—could be catastrophic if we didn’t have policies in place to protect us from the consequences when those risks come to fruition.

Read More »

98 Percent of Employees Say Their Privacy Is Important to Them—But Is It? [Infographic]

2017-05-26+0000| | In-house Counsel, Cybersecurity & Data Privacy

041217-harris-poll-survey-feature-image.pngBetween Wikileaks, tech experts, and the Federal Trade Commission, we have no shortage of sources reminding us on an almost daily basis that the Information Age brings both invaluable new resources and technology, and a significant threat to personal privacy. Data is everywhere, and it’s accessible by more entities than ever—including employers.

To get to the heart of how employees understand data privacy and how their online behavior at work can impact it, kCura recently commissioned a survey conducted by Harris Poll among 1,013 US adults age 18 and older who were employed full-time or part-time, working in a traditional office setting for at least 50 percent of the time, and are not freelancers (referred to as “employees” throughout).

Read More »

Cybersecurity Regulation & You: Time to Become Part of the Solution

2017-05-26+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy, Litigation Support

040617-Cybersecurity-Regulation.pngSlowly but surely, law firms and e-discovery service providers are beginning to tackle cybersecurity risks. Firms are starting to appreciate that they're susceptible to the same privacy and data security concerns as other businesses and, as aggregators of confidential, protected, and sensitive data, they’re a high-value target for cyber criminals.

Nevertheless, many firms still consider cybersecurity a "should have someday"—as opposed to a "must have today"—goal. New York's Department of Financial Services (DFS), the state's financial regulator, has recently changed that thinking.

Read More »

SXSW 2017: Bats, Biometrics, and Solving Tomorrow’s Data Challenges

2017-05-26+0000| | Review & Production, Community, Education & Certification, Cybersecurity & Data Privacy

blog_SXSW-takeaways.pngEvery March, there are two great migrations to Austin, Texas. The first is the arrival of the city’s huge Mexican free-tailed bat colony, which spends the summer and fall living, breeding, and hunting in and around the Congress Street Bridge. When the colony’s newborn bat pups take wing in August, more than 1.5 million bats share the skies above the capitol city.

The second migration is generally considered to be much weirder. March in Austin also means South by Southwest, which for nearly 30 years has gathered the world’s finest creative minds in technology, music, and film to discuss wicked problems and innovate solutions across industries. The festival has been a launching point for apps like Twitter and Foursquare and hosted talks by tech developers and world leaders, including a 2016 appearance by Barack Obama.

Read More »

Cybersecurity 101: Protecting Law Firms from ‘Bad Actor’ Entry via Email Phishing

2017-05-26+0000| | Community, Cybersecurity & Data Privacy

blog_protect-from-bad-actor-entry-via-email-phishing.pngHeadlines have made no secret that law firms are at particular risk of cyber attacks, and their vulnerability comes from both a lack of preparedness and the simple fact that their troves of sensitive client information make prime targets for baddies.

Simplified e-discovery is often a positive consequence of strong cybersecurity policies and diligent data protection, and plenty of tools and techniques help bolster those upstream processes. Paul Everton, founder and CEO of MailControl—a company whose Enterprise Privacy ShieldTM software helps law firms and others increase security against the rising threat of spymail—recently shared his thoughts on these techniques with us.

Read More »

Everything You Wanted to Know About Cyber Insurance But Were Too Afraid to Ask

2017-05-26+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy

blog_everything-you-wanted-to-know-about-cyber-insurance.png“Hoping for the best, prepared for the worst, and unsurprised by anything in between.” Maya Angelou

Businesses are advised to insure themselves against all sorts of dangers, however unlikely. Cybersecurity has joined the ranks of acknowledged business vulnerabilities. That vulnerability is particularly strong among corporations who house confidential customer data as a matter of course, like health providers—and it’s also top-of-mind for law firms, who often hold their clients’ most sensitive business and personal information.

Read More »

5 Tactics to Improve Your Security in 2017

2017-05-26+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy

blog_security-tips-security-bill.pngThere are few modern catastrophes more frightening to today’s corporation than a data breach. When critical data is compromised, everyone suffers: employees, customers, CEOs, and legal teams must all face the consequences.

Fortunately, even as would-be hackers with ill intent get smarter, technology is getting smarter, too. There are ways for every organization to protect themselves against threats, cyber and otherwise.

Read More »

Murder, Data Privacy, and the Internet of Things

2017-05-26+0000| | Legal Update, Law Firm, Cybersecurity & Data Privacy

blog_amazon-echo-case.pngWhen James Bates, Owen McDonald, and Victor Collins began an evening of football, drinking, and hot tubbing on November 21, 2015, they probably had no idea they were on the verge of making new law in the expanding specialty of data discovery.

However, by the following morning, Collins was dead and Bates was in the crosshairs of a police investigation. The Bates home being somewhat typical in the era of the Internet of Things, it included a device known as an electronic home assistant. Thus, a fundamental legal question soon arose: is it lawful for police to seize and examine data from an Amazon Echo?

Read More »

e-Discovery Star Wars, Episode II: Defending your Galaxy

2017-05-26+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy, Litigation Support

122016-rogue-one-part-2.png"Plug in. He should be able to interpret the entire Imperial computer network." – Obi-Wan Kenobi, speaking about R2-D2 seconds after accessing a “secure” Death Star control room

In our last post inspired by the release of Rogue One: A Star Wars Story, we looked at how lessons from the Star Wars films reveal three key ways that every organization can better secure themselves against modern cyber threats: don’t be arrogant, keep an active imagination, and create a culture of security. William Lederer, chief security officer at kCura (respectfully and affectionately known as “Security Bill”) helped provide some insights into how these tactics can impact an organization’s security strategy.

Read More »
 

Get the Relativity Blog

Get The Relativity Blog

About the Blog

The Relativity Blog provides engaging e-discovery and legal technology lessons to a diverse audience of practitioners. Written by the team behind Relativity and the community that drives this industry, the blog is your go-to source for tangible takeaways, thought-provoking discussion, and expert insights into stories and technologies that can help you improve your day-to-day work.

Share Your Expertise

Want to be an author on The Relativity Blog? We’re always happy to feature readers.

Learn More