Category Industry Trends

The GDPR Will Crush All Unprepared Entities

by Michael D. Sarlo, EnCE, RCA, CBE, CCLO, CCPA I know, I know – that title might come across as hyperbole or sensationalism. However, there have been several relatively scary findings in recent studies that show the General Data Protection Regulation, which the European Union will implement May 25th, 2018, is a lingering juggernaut that […]

President Trump’s Cybersecurity Executive Order: What You Need To Know

by Alexander Gessen, CCE, EnCE, CISSP President Donald J. Trump signed and released the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure last Thursday. This latest executive order will lead to several changes in the ways that the U.S. Government – and all its agencies – are expected to handle […]

German Privacy Legislation: What American Firms Need To Know

by Michael D. Sarlo, EnCE, RCA, CBE, CCLO, CCPA International privacy laws have been an unwieldy beast for years now, and only continue to evolve at a faster pace as time goes on. One of the greatest examples of this perpetual shift can be found in Germany, where lawmakers are poised to make several relatively […]

Mobile Phone Forensics: The 360-Degree Management Approach

by Michael D. Sarlo, EnCE, RCA, CBE, CCLO, CCPA There is no denying that mobile phone collections and forensics are becoming more common centerpieces of modern litigation. There is also no denying that many corporations, in-house legal departments, and law firms are simply not prepared for the eDiscovery implications of this trend. With eDiscovery costs […]

eCTD Deadline: Are you prepared?

by Michael D. Sarlo, EnCE, RCA, CBE, CCLO, CCPA Starting this Friday, May 5th, the U.S. Food and Drug Administration will only accept New Drug Applications (NDAs), Abbreviated NDAs (ANDAs), and Biologics License Applications (BLAs) in the Electronic Common Technical Document (eCTD) format. One year from that date, or May 5th, 2018, the eCTD submission […]

Ethical Hacking: What Attorneys Need To Know

by Paul Jensen The point at which law and technology meet is becoming more prominent in litigation proceedings, effectively dictating outcomes of trials with greater consistency as time goes on. Attorneys are gaining access to sensitive devices, data storage environments, and other cornerstones of digital business more frequently than ever before. Collections, reviews, and other […]

How Tight Are Your IP Governance Frameworks?

by Michael D. Sarlo Intellectual property has been at the center of countless instances of theft and fraud in the past several years. The mass digitization of information combined with the increasing susceptibility to data breaches has made it more difficult than ever before to keep IP private. At the same time, in-house attorneys are […]

Q&A: HAYSTACKID Managing Director Larry Lieb Discusses the Art of Custodianship – Pt. 2

In the first part of this Q&A, HAYSTACKID Managing Director Larry Lieb discussed general concepts related to the Art of Custodianship, as well as how smartphones and other advanced technologies have transformed relevant procedures. Now, he explains what makes HAYSTACKID’s approach to custodial processes and collections different from others in the field, as well as […]

Q&A: HAYSTACKID Managing Director Larry Lieb Discusses the Art of Custodianship – Pt. 1

The evolution of technology and rapid transition away from paper-based records management to digital systems have had profound impacts on evidence custodianship. From individual employees acting as custodians of devices and custodial interviews conducted during collections, to the preservation of files and beyond, the game has changed immensely in the past 10 years. Larry Lieb, […]

App-alling Risk: Preparing for Complex Data Discovery

by John Mielitz The explosive growth of data volumes has forced enterprises to re-evaluate their preservation and governance models, but perhaps not as intensely as the expanding diversity of information sources. Not so long ago, personal computers were the biggest source of corporate data, and the number of applications generating, storing, sharing, and managing information […]