Sarah Cole explores the evolution of approaches to mitigate the costs of discovery on ever increasing data volumes and considers what strategies can be be successfully deployed next.
Filter Posts:
Sarah Cole explores the evolution of approaches to mitigate the costs of discovery on ever increasing data volumes and considers what strategies can be be successfully deployed next.
Apple announced that in their upcoming iOS 16 release, iMessage will include the ability to unsend messages, as well as edit messages after sending. Sarah Cole explores the discovery implications of these new features.
Sarah Cole discusses ROT data and explores methods to prevent future ROT data accumulation. This article is the final installment of a three-part series on the dangers of ROT data and how best to approach it.
Sarah Cole discusses ROT data and explores methods to identify and delete it with the help of technology. This article is part two of a three-part series on the dangers of ROT data and how best to approach it.
In this article we discuss the management of sensitive data, and how to start by classifying data sensitivity into broad, widely applicable categories based on the risk level.
In this article, we will address the California Privacy Rights Act (CPRA). We introduce the data privacy legislation and discuss frequently asked questions about the CPRA.
The General Data Protection Regulation has been around for years, and you likely cannot make it through a news cycle without hearing the term “Brexit” yet, questions still abound about what they mean together.
Operationalizing your DSAR response. This article provides guidelines on how to evaluate, improve and manage risk when responding to a DSAR.
Tom Preece, Rational’s Business Development Manager, recently spoke with Kurt Wimmer about his thoughts on emerging data privacy and security trends and how organizations should begin to address these risks. Kurt Wimmer is the U.S. chair of Covington & Burling’s Data Privacy and Cybersecurity practice…
Tom Preece, Rational’s Business Development Manager, recently spoke with Ted Augustinos, Partner at Locke Lord LLP, about his thoughts on how organizations should best address emerging trends in cyber and information security. Ted is a member of Locke Lord’s Privacy and Cybersecurity Practice Group,…