“There are several international standards and guidelines for developing the cybersecurity of a single organization, but it is difficult to find comprehensive tools for national governments. This handbook – National Cyber Security in Practice – is designed to fill that gap. The articles, written by seasoned experts, will give the reader an overview of the key elements that underpin the cybersecurity architecture of any country,” highlighted Arvo Ott, Chairman of the Management Board of e-Governance Academy.
The NIST Privacy Framework is a voluntary tool intended to help organizations identify and manage privacy risk to build innovative products and services while protecting individuals’ privacy.
As highlighted by Alan Henry in his recent New York Times article, when people in the workplace have been treated unfairly and decide to speak up about it, they’re usually told to consider the intentions of the aggressor instead of the action, or to consider that maybe the issue isn’t as bad as they think, or not significant enough to warrant corrective action. Worse, they may be told that the event didn’t happen at all. Whether you think you’re being gaslit by a co-worker trying to get away with treating you poorly, or a boss who would rather not confront bad behavior, trust your experiences and your interpretations of those experiences.
Workplace bullying, as defined in the 2017 WBI Workplace Bullying Survey, includes the repeated mistreatment of an employee by one or more employees; abusive conduct that is: threatening, humiliating or intimidating, work sabotage, or verbal abuse. Recognizing and appropriately responding to it can be critical to reducing its impact in environments ranging from the courtroom to the c-suite. If not dealt with properly, workplace bullying hurts relationships, performance, and communications, directly impacting organizational and individual productivity, revenue, and outcomes.
The California Consumer Privacy Act (CCPA), a broad-based law protecting information that identifies California residents, will take effect in 2020. The law includes detailed disclosure requirements, provides individuals with extensive rights to control how their personal information is used, imposes statutory fines and creates a private right of action. It is expected to dramatically alter the way U.S.-based companies process data.
Just as there are many tasks in electronic discovery, many times there are multiple technologies and platforms involved in the complete electronic discovery process. When there are multiple technologies and platforms involved, data must be transferred from disparate technologies and platforms to other disparate technologies and platforms. This data transfer can be considered a risk factor that impacts the overall electronic discovery process.
Disputes over trade secrets and confidential information have increased dramatically in recent years. Often arising after a business hires an employee from a competitor, a proposed acquisition falls through, or information is leaked through overseas operations, these cases expose companies to large financial damages, crippling injunctions and even criminal prosecution.
A Boston company that helps inventors and small companies enforce their patents filed a series of lawsuits this week against e-discovery company kCura, developer of the Relativity search and review platform, and several of kCura’s partners, alleging violation of a patent for concept-based visual presentation of search results.
An international team of journalists has obtained what it’s referring to as the “biggest leak in history”: A 2.6-terabyte stash of data about offshore savings and tax havens from Panama-based legal firm Mossack Fonseca.
The fact is that, of the nearly 5,000 publicly-known data breaches over the past dozen or so years, less than 5% have resulted in litigation. If your cyber coverage only kicks in when a third party makes a claim, then practically speaking you may not have any coverage at all.