Key Takeaways from the Sedona Conference Commentary On Defense of EDiscovery Process: Principles 7-9 (Part III)

In Part I and Part II of this series, we discussed the key takeaways from Principles 1-3 and 4-6, respectively, of The Sedona Conference WG1’s “Commentary on Defense of Process: Principles and Guidelines for Developing and Implementing a Sound E-Discovery Process” (available for download here).

Tweet Like LinkedIn LinkedIn Google Plus

UK Ministry of Defence Loses Landmark Afghan Veteran Case Due to Sloppy E-Disclosure

By | Carpe Datum Law | December 2, 2016

The UK Ministry of Defence (“MoD”) lost a high-profile case after failing, first, to comply with a trial judge’s disclosure order and failing to meet a deadline for compliance with the court’s “Unless Order” which warned that non-compliance would result in MoD having its defences struck out and judgment entered for the claimant.

Tweet Like LinkedIn LinkedIn Google Plus

Cyber Criminals Will Target IoT Since by 2020 92% of All Data Will Be in the Cloud!

Cyber Criminals Will Target IoT Since by 2020 92% of All Data Will Be in the Cloud!

Rest assured that cyber criminals read Cisco’s report that cloud usage will grow significantly based on the scope of “big data and associated Internet of Things” with expectations that cloud usage as of 2015 at about “3.9 zettabytes (ZB) per year…to 14.1 ZB per year by 2020.”

Tweet Like LinkedIn LinkedIn Google Plus

About 75% of Companies Don’t Have Adequate Cyber Security Incident Response Plans (IRPs), So How Cyber Resilient is Your Company? or Law Firm?

About 75% of Companies Don’t Have Adequate Cyber Security Incident Response Plans (IRPs), So How Cyber Resilient is Your Company? or Law Firm?

Of the 2,000 IT and IT security professionals surveyed by the Ponemon Institute “75% of respondents admit they do not have a formal cyber security incident response plan (CSIRP) that is applied consistently across the organization” and 51% rated cyber resilience as “very important or essential to achieving a strong security posture.” 

Tweet Like LinkedIn LinkedIn Google Plus