Foreign parties litigating cases in the United States do not always play by the same discovery rules as their domestic counterparts.
In a trademark infringement case pending in the Northern District of California (InternMatch v. Nxtbigthing, 2016 WL 491483 [N.D. Cal. Feb. 8, 2016]), plaintiff requested copies of any documents relating to the defendants’ defense that it had continually and pervasively used the trademark at issue.
Well-known predictive coding expert attorney, Maura Grossman, and her husband, noted information scientist, Gordon Cormack, recently began on article in Practical Law magazine with the assertion:.
A recent survey of 2,200 Information Security Community professionals indicated that concerns “about legal and regulatory compliance have seen the biggest gain, moving from the number 7 spot (24%) to number 4 (39%)” and that 49% believed that “one of the major barriers to cloud adoption is the fear of data loss and leakage.”
Where is AI’s (and other analytics technologies) place in law?
As noted in the Advisory Committee’s commentary to the recently amended Federal Rule of Civil Procedure 37(e), two goals of the amendments were: (1) to create uniformity among the Federal courts in imposing sanctions for the spoliation of electronically stored information, and (2) to prevent the imposition of harsh sanctions – such as an adverse inference instruction — for the merely negligent, or even grossly negligent, spoliation of ESI.
With a possible sentence of 20 years in prison for hacking for a trial set for June 28, 2016 the US Attorney commented about the indictment that “IT administrators often hold the ‘keys to the kingdom’ for companies, … Disgruntled IT administrators can therefore pose a grave threat to businesses, which must take measures to protect themselves when letting such an employee go.”
Apple & Google Are Among 8 Mobile Device Companies the FTC Ordered to Disclose Security Update Practices
The Federal Trade Commission (FTC) “is seeking to compile data concerning policies, procedures, and practices for providing security updates to mobile devices offered by unnamed persons, partnerships, corporations, or others in the United States.”
Chief Justice Roberts commented that the newly amended Federal Rule of Civil Procedure, Rule 26 “crystalizes the concept of reasonable limits in discovery through increased reliance on the common-sense concept of proportionality.”
Is there any doubt that training employees about phishing would help reduce the malware damage?