With CPRA's effective date fast approaching, organizations must make sure they're compliant with its requirements while there is still time to remedy any shortcomings.
Where does that leave legal teams who have to account for organizational communications in matters of e-discovery—particularly as regards the obligation to preserve data under legal holds? In a recent whitepaper, Overcoming Legal Discovery Challenges in Remote & Hybrid Workplaces, Exterro explores some of these issues and challenges. Here are some tips to consider in your organization.
We asked several experts about what trends they saw coming next and how organizations could prepare for them, and this article will focus on three highlights from those conversations.
Understanding retention requirements is a fundamental first step in operationalizing a data retention program. Here are four baseline requirements your organization must meet.
Based on survey data from over 70 respondents, representing 10 industries and companies with revenues from < $1 million to > $1 billion a year, this report gives a glimpse behind the curtain at how organizations uncover the facts around potential employee wrongdoing, regulatory compliance, civil litigation, and more.
Many hash algorithms have been created over the years, but the most commonly applied algorithm in use today for e-discovery is the MD5 (“MD" being short for message-digest).
Earlier this year, the Okta breach captured the infosec headlines. Okta, the #1 identity and access management company, was breached. In the chain of events that transpired, the hackers found on the network a file containing the passwords of domain administrators. Yes, that’s right: domain administrator passwords — the keys to the kingdom.
On May 18, 2022, the AEPD issued its decision against Google, imposing a fine of €10 million for violations of two articles of GDPR. The two violations were against Article Six, regarding lawful processing of data, and Article 17, regarding the “right to be forgotten.”
If you lose your employees’ interest in the training, they will also be much less motivated to help you protect your digital assets. In this article, we examine some of the key components that make an “awe-inspiring” cyber training program.