Usually clients do not understand or want to respond to discovery.
Key Takeaways from the Sedona Conference Commentary On Defense of EDiscovery Process: Principles 7-9 (Part III)
In Part I and Part II of this series, we discussed the key takeaways from Principles 1-3 and 4-6, respectively, of The Sedona Conference WG1’s “Commentary on Defense of Process: Principles and Guidelines for Developing and Implementing a Sound E-Discovery Process” (available for download here).
The UK Ministry of Defence (“MoD”) lost a high-profile case after failing, first, to comply with a trial judge’s disclosure order and failing to meet a deadline for compliance with the court’s “Unless Order” which warned that non-compliance would result in MoD having its defences struck out and judgment entered for the claimant.
This is Fashion Santa.
Experian reported that the “healthcare sector may continue to be the focal point for hackers as medical identity theft remains lucrative and easy for cyber criminals to exploit.”
Senior United States District Judge Terrence McVerry granted a party’s motion to compel the opposing party to meet and confer regarding search terms to apply to electronically stored information.
Rest assured that cyber criminals read Cisco’s report that cloud usage will grow significantly based on the scope of “big data and associated Internet of Things” with expectations that cloud usage as of 2015 at about “3.9 zettabytes (ZB) per year…to 14.1 ZB per year by 2020.”
Business Insurance reported that “Cyber criminals have remotely attacked cash machines in more than a dozen countries across Europe this year, using malicious software that forces machines to spit out cash.”
About 75% of Companies Don’t Have Adequate Cyber Security Incident Response Plans (IRPs), So How Cyber Resilient is Your Company? or Law Firm?
Of the 2,000 IT and IT security professionals surveyed by the Ponemon Institute “75% of respondents admit they do not have a formal cyber security incident response plan (CSIRP) that is applied consistently across the organization” and 51% rated cyber resilience as “very important or essential to achieving a strong security posture.”
Infoworld reported that “IBM Security is currently in the middle of a year-long research project working with eight universities to help train Watson to tackle cybercrime.”