This site uses cookies to provide you with a more responsive and personalized service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print this page

How to Determine the Security of Your Data During eDiscovery

Discovery Digest – Q3 2012

When large data breaches occur, they can garner negative press and publicity. Even when they don’t make the front page of the business section, security breaches cost organizations a great deal of money, time and reputational damage. 

While in-house attorneys understand the need to carefully safeguard the data they collect from clients and customers, they often don’t consider how vulnerable their data can be during discovery and litigation.

But data is prone to hacking when transmitted to others, including law firms and litigation support vendors. To minimize the chances of breaches during litigation, the legal team needs to understand basic security standards, identify potential weaknesses when data could be hacked and develop procedures to minimize the chances of someone stealing electronic information.

How to determine the security of your data during eDiscovery


Back to Discovery Digest – Q3 2012

As used in this document, “Deloitte” means Deloitte Financial Services LLP. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.

While the information in this article may deal with legal issues, it does not constitute legal advice. If you have specific questions related to information discussed in this article, you are encouraged to consult an attorney who can investigate the particular circumstances of your situation.

Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options

Stay connected