“Can I use ediscovery to respond to a data breach?” Technically, the answer is “yes,” — but should you? That’s the real question, and a wrong decision could compromise your..
As PHI breaches including billions of entities become more common, review teams need to adjust how they approach these incidents.
In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..
Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..
Abnormal churn, defined as the loss of customers due to a data breach, is on the rise in the United States. According to the 2018 Cost of Data Breach Study by IBM and the Ponemon..