Go to Top

Tag Archives

Tag Archives: Cloud

Join us in Indianapolis for a special Trade Secret Protection CLE event

Want to learn how to help your clients protect their trade secrets? JOIN US FOR A VERY SPECIAL CLE EVENT: Trade Secret Protection – Using Technology to Safeguard Your Most Valuable Assets When? Wednesday, February 7, 2018 Where? The Columbia Club, Capehart / Riley / Steel Room, 121 Monument Circle, Indianapolis, IN, 46204 5:00PM: Gathering, Networking, Cocktails & Hors d’oeuvres 5:30-6:30PM: CLE Presentation, Q&A ATTENDEES ARE ELIGIBLE FOR ONE GENERAL CLE …Read More

Join us for a very special CLE presentation on Trade Secret Protection

CONSIDER THE STATISTICS Trade secret theft is at an all-time high. Businesses of all sizes face serious risks to their bottom line, competitive position, and even survival. Lawyers face an increasingly complex landscape when it comes to counseling their clients on trade secret protection in our digital world. Up to $480 billion in business losses were attributed to trade secret misappropriation last year 50% of employees that left their jobs in …Read More

Junior Forensic Investigator – Chicago

4Discovery is looking to add an individual to our digital forensic and incident response team in Chicago. Our ideal candidate for this position will have a basic understanding of digital forensic principles, incident response methodologies, and best practices. Knowledge of digital forensic lab practices, procedures, and evidence handling is a plus. Experience with industry digital forensic and investigative tools such as EnCase, X-Ways, FTK, Cellebrite, F-Response, and open source tools …Read More

Shocking Survey Reveals Only 31% of Organizations are Prepared for a Trade Secret Misappropriation

Baker McKenzie Survey Exposes Board-Level Risks that Companies are NOT Prepared For[1] The scenario Your client’s IT Director tells his boss that he has observed suspicious behavior on the company’s network. It seems a senior software code designer for the high-speed securities trading company is downloading massive volumes of proprietary trading software code and copying it to a CD burner. Not good. The employee has recently complained about the strategic …Read More

WannaCry? Your Law Firm Data Security is Only as Good as Your Weakest Vendor

Recent Ransomware Events Highlight Risks & Your Cyber Insurance Policy May Not Cover Losses The WannaCry incident has created a unique opportunity to examine the potential catastrophic impact of ransomware on businesses, and in particular, business interruption considerations. The following scenario is provided as a way to create discussion opportunities with your clients, IT team, attorneys, and risk managers. The Scenario You’re sitting in your office putting the final touches on a …Read More

Hillary Clinton’s eMail Drama: Tips From the Trenches

I am in the digital forensics business.  That means that when something related to eMail or computer evidence is in the news, my friends and family ask me questions, like:  “are Tom Brady’s destroyed “DeflateGate” text messages recoverable?”, and “could you recover data from the submerged mobile phones from missing Malaysian Airlines Flight 370 if it was ever recovered?”  So, I get used to these questions.  It’s kind of fun. …Read More

Retweet Case Raises Free Speech Debate

Can a person be held criminally responsible for “Retweeting” another person’s content, or is such communication protected under The First Amendment’s “Free Speech” language? Communication in our electronic world is bending a number of legal concepts into strange new shapes. Consider Safya Roe Yassin, a 39-year-old citizen that was recently arrested for conspiracy and transmitting threats over state lines.  Her alleged crime?  Retweeting twitter posts from a third party that …Read More