Latest Articles

In Realpage Inc. v. Enter. Risk Control, LLC, 2017 BL 102339 (E.D. Tex. 2017), the court ordered Enterprise Risk Control, LLC (“Enterprise”) to produce forensic images of devices used by a former Realpage employee to a forensic neutral in order to determine whether any source code was recoverable pertaining to Realpage’s allegations of misappropriation. Background After leaving employment with Realpage in 2012, Tom Bean (“Bean”) started his own software development company named IDC. Bean and…
On September 19, 2016, Ross Compton told police that when he noticed a fire in his Middleton, Ohio home, he hastily packed suitcases, broke a window with his cane, and pushed his bags out the window, at which point he carried them to his car. After describing the scene to a 911 dispatcher, Compton added that he had an artificial heart. However, authorities began to question Compton’s story when they found gasoline on Compton’s clothes…
On December 28, 2016, New York published a revised version of its proposed “Cybersecurity Requirements for Financial Services Companies” aimed at increasing the requirements and protections for information security, auditing, and reporting for financial institutions doing business within New York state. The regulation was announced on September 13, 2016 as the first-of-its-kind regulation to protect consumers and financial institutions and had intended to go into effect January 1, 2017. However, in response to the 45-day…
Over the past few years, there has been a significant increase in the number of tools available to attorneys to analyze and review electronically stored information (“ESI”) that has been collected from clients or produced by opposing parties. While courts and attorneys continue to become Over the past few years, there has been a significant increase in the number of tools available to attorneys to analyze and review electronically stored information (“ESI”) that has been…
As part of its Working Group on Electronic Document Retention & Production, the Sedona Conference recently released a “TAR Case Law Primer” that analyzes court decisions that directly or indirectly touch upon issues involving technology-assisted review (“TAR”). The primer begins with a brief summary of Da Silva Moore v. Publicis Groupe, 287 F.R.D. 182 (S.D.N.Y. 2012), the first published opinion agreeing that TAR is an “acceptable way to search for relevant ESI in appropriate cases.”…
Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still open a user’s computer to security issues. Recently, Wired reported that security firm Cylance discovered a vulnerability in a specific brand of network routers deployed throughout many hotel chains throughout the world that could allow someone to install malware on guest’ computers, analyze and…
Over the past few years, users have become increasingly aware of the inherent dangers of connecting to unsecured Wi-Fi networks. Unfortunately, existing security vulnerabilities in the underlying network hardware may still open a user’s computer to security issues. Recently, Wired reported that security firm Cylance discovered a vulnerability in a specific brand of network routers deployed throughout many hotel chains throughout the world that could allow someone to install malware on guest’ computers, analyze and…