How to Determine the Security of Your Data During E-DiscoveryDiscovery Management Digest – Q3 2012 |
|
When large data breaches occur, they can garner negative press and publicity. Even when they don’t make the front page of the business section, security breaches cost organizations a great deal of money, time and reputational damage.
While in-house attorneys understand the need to carefully safeguard the data they collect from clients and customers, they often don’t consider how vulnerable their data can be during discovery and litigation.
But data is prone to hacking when transmitted to others, including law firms and litigation support vendors. To minimize the chances of breaches during litigation, the legal team needs to understand basic security standards, identify potential weaknesses when data could be hacked and develop procedures to minimize the chances of someone stealing electronic information.
How to determine the security of your data during E-Discovery
From Insidecounsel.com
- Part I: "While the Federal Rules of Civil Procedure haven’t set a standard, you can look elsewhere for guidance"
- Part II: "Crafting security best practices to keep data safe"
Back to Discovery Management Digest – Q3 2012
As used in this document, “Deloitte” means Deloitte Financial Services LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
While the information in this article may deal with legal issues, it does not constitute legal advice. If you have specific questions related to information discussed in this article, you are encouraged to consult an attorney who can investigate the particular circumstances of your situation.



