Companies poring over high-stakes investigations and litigation now have immediate access to a powerful new service to assist in identifying and analyzing digital clues from mobile devices through HaystackID’s Mobile Elite Discovery and Analysis Lab (MEDAL). In this on-demand educational presentation, digital forensics experts John Wilson and Rene Novoa share considerations for full-file system and physical extractions from both Android and iOS devices with HaystackID’s MEDAL service.
This one-hour panel presentation, presented at the 2021 Privacy + Security Fall Academy on September 30, 2021, provides viewers with a framework and solutions for deploying privacy-based information governance technologies, tactics, and strategies to help their organization comply with the ever-changing landscape of data privacy laws, while also reducing their exposure in the event of a security incident when sensitive data has been compromised by threat actors.
Every large corporation and organization today face the significant threat of cybersecurity incidents. However, most practitioners who handle litigation and investigation matters are unfamiliar with the basics of responding to cybersecurity incidents and the challenges associated with incident response and post-data breach requirements.
From ransomware remediation to incident response, this webcast presentation will highlight cutting-edge data discovery technologies and proven document review services to support the detection, identification, review, and notification processes required by law after sensitive data-related breaches and disclosure.
Complex information governance challenges require a comprehensive and complete approach to understanding an organization’s data profile through the lenses of compliance, privacy, and litigation. Data mapping is a critical component of this understanding. The practices, protocols, and processes around this vital component can make the difference between an organization’s comfort or concern regarding its data profile.
In this presentation, experts will share insight into the automation of unique workflows to better engage with these rapid-response projects. The timelines are short, the data volumes are larger than ever, and the reporting obligations are becoming increasingly onerous. Clients are asking for alternatives and technical solutions to a problem that is not going away any time soon.
Managing public comment responses for environmental impact projects, rule changes, and permit applications requires the latest technology with comprehensive workflows to meet strict deadlines and detailed reporting requirements. In this presentation, industry eDiscovery experts will share how to streamline and optimize the labor-intensive process of accepting and resolving public feedback using Relativity coupled with innovative workflows.
In this expert presentation, cybersecurity incident response, legal discovery, and privacy experts will share how organizations should be prepared to respond to a cyber-related incident, while also gaining insight into cutting-edge data discovery technologies and proven document review services to support the detection, identification, review, and notification processes required by law after sensitive data-related breaches and disclosure.
eDiscovery experts and commentators have championed the promise of technology-assisted review (TAR) since Judge Andrew Peck’s Da Silva Moore decision in February of 2012. But exactly how is TAR faring in the real world of complex discovery?
As harsh as it sounds, every departing employee poses a risk to your business if the transition is not correctly managed and documented. This risk ranges from inadvertent access to sensitive company information as basic as internal organizational charts to deliberate efforts to acquire and use economically essential customer lists and contracts for competitive advantage. In this presentation, expert investigation and eDiscovery panelists will share considerations and highlight approaches that can help organizations proactively and reactively mitigate departing employee risk in six critical areas of risk.