Data collection can be the most complex and technically rigorous of all discovery phases. It involves the extraction of potentially relevant electronically stored information (ESI) from its native ...
With a patchwork of U.S. state privacy laws, there’s a lot of uncertainty about what needs to be done and when. Fortunately, you can become broadly compliant by following some basic best practices. If ...
The first quarter gives businesses a chance to build momentum for their privacy program, whether by confirming what’s working or adjusting what’s not.
2. A description of the security breach, which should include: a. the categories and number of data subjects concerned 3. The measures taken or proposed to be taken to mitigate or address the possible ...