Lightning Strikes and Power Surges Insufficient to Insulate Defendant from Discovery Sanctions

By | All About eDiscovery | May 25, 2016
Lightning Strikes and Power Surges Insufficient to Insulate Defendant from Discovery Sanctions

In a trademark infringement case pending in the Northern District of California (InternMatch v. Nxtbigthing, 2016 WL 491483 [N.D. Cal. Feb. 8, 2016]), plaintiff requested copies of any documents relating to the defendants’ defense that it had continually and pervasively used the trademark at issue.

Tweet Like LinkedIn LinkedIn Google Plus

Legal Risk Moved to 4th Biggest Cloud Security Concern!

Legal Risk Moved to 4th Biggest Cloud Security Concern!

A recent survey of 2,200 Information Security Community professionals indicated that concerns “about legal and regulatory compliance have seen the biggest gain, moving from the number 7 spot (24%) to number 4 (39%)” and that 49% believed that “one of the major barriers to cloud adoption is the fear of data loss and leakage.”

Tweet Like LinkedIn LinkedIn Google Plus

For Now, Residential Funding and “Inherent Authority” Doctrine for Spoliation Sanctions Live On

For Now, Residential Funding and “Inherent Authority” Doctrine for Spoliation Sanctions Live On

As noted in the Advisory Committee’s commentary to the recently amended Federal Rule of Civil Procedure 37(e), two goals of the amendments were: (1) to create uniformity among the Federal courts in imposing sanctions for the spoliation of electronically stored information, and (2) to prevent the imposition of harsh sanctions – such as an adverse inference instruction — for the merely negligent, or even grossly negligent, spoliation of ESI.

Tweet Like LinkedIn LinkedIn Google Plus

IT Administrator with ‘keys to the Kingdom’ Indicted for Hacking Former Employer

IT Administrator with ‘keys to the Kingdom’ Indicted for Hacking Former Employer

With a possible sentence of 20 years in prison for hacking for a trial set for June 28, 2016 the US Attorney commented about the indictment that “IT administrators often hold the ‘keys to the kingdom’ for companies, … Disgruntled IT administrators can therefore pose a grave threat to businesses, which must take measures to protect themselves when letting such an employee go.” 

Tweet Like LinkedIn LinkedIn Google Plus

Apple & Google Are Among 8 Mobile Device Companies the FTC Ordered to Disclose Security Update Practices

Apple & Google Are Among 8 Mobile Device Companies the FTC Ordered to Disclose Security Update Practices

The Federal Trade Commission (FTC) “is seeking to compile data concerning policies, procedures, and practices for providing security updates to mobile devices offered by unnamed persons, partnerships, corporations, or others in the United States.” 

Tweet Like LinkedIn LinkedIn Google Plus