Challenged by Privacy? The NIST Privacy Framework

The NIST Privacy Framework is a voluntary tool intended to help organizations identify and manage privacy risk to build innovative products and services while protecting individuals’ privacy.


Organizational Sacred Space? Culture, Marginalization, and Innovation

As highlighted by Alan Henry in his recent New York Times article, when people in the workplace have been treated unfairly and decide to speak up about it, they’re usually told to consider the intentions of the aggressor instead of the action, or to consider that maybe the issue isn’t as bad as they think, or not significant enough to warrant corrective action. Worse, they may be told that the event didn’t happen at all. Whether you think you’re being gaslit by a co-worker trying to get away with treating you poorly, or a boss who would rather not confront bad behavior, trust your experiences and your interpretations of those experiences.


Workplace Bullying: Definitions, Demographics, and Destructiveness

Workplace bullying, as defined in the 2017 WBI Workplace Bullying Survey, includes the repeated mistreatment of an employee by one or more employees; abusive conduct that is: threatening, humiliating or intimidating, work sabotage, or verbal abuse. Recognizing and appropriately responding to it can be critical to reducing its impact in environments ranging from the courtroom to the c-suite. If not dealt with properly, workplace bullying hurts relationships, performance, and communications, directly impacting organizational and individual productivity, revenue, and outcomes.


The California Consumer Privacy Act of 2018: Four Educational Extracts

The California Consumer Privacy Act (CCPA), a broad-based law protecting information that identifies California residents, will take effect in 2020. The law includes detailed disclosure requirements, provides individuals with extensive rights to control how their personal information is used, imposes statutory fines and creates a private right of action. It is expected to dramatically alter the way U.S.-based companies process data.


Drunks, DNA and Data Transfer Risk in eDiscovery

Just as there are many tasks in electronic discovery, many times there are multiple technologies and platforms involved in the complete electronic discovery process. When there are multiple technologies and platforms involved, data must be transferred from disparate technologies and platforms to other disparate technologies and platforms. This data transfer can be considered a risk factor that impacts the overall electronic discovery process.

Accused of Taking Confidential Information? Five Immediate Steps That Can Limit Risk

Disputes over trade secrets and confidential information have increased dramatically in recent years. Often arising after a business hires an employee from a competitor, a proposed acquisition falls through, or information is leaked through overseas operations, these cases expose companies to large financial damages, crippling injunctions and even criminal prosecution.

Patent Lawsuits Target E-Discovery Company kCura and Its Partners

A Boston company that helps inventors and small companies enforce their patents filed a series of lawsuits this week against e-discovery company kCura, developer of the Relativity search and review platform, and several of kCura’s partners, alleging violation of a patent for concept-based visual presentation of search results.

2.6TB Data Leak Reveals Corruption Amongst World Leaders

An international team of journalists has obtained what it’s referring to as the “biggest leak in history”: A 2.6-terabyte stash of data about offshore savings and tax havens from Panama-based legal firm Mossack Fonseca.

Cyber Insurance: Make Sure You Understand Your Coverage

The fact is that, of the nearly 5,000 publicly-known data breaches over the past dozen or so years, less than 5% have resulted in litigation. If your cyber coverage only kicks in when a third party makes a claim, then practically speaking you may not have any coverage at all.