Shields Up! Protecting Private Data in eDiscovery

17 Feb , 2022

To register for the upcoming live webinar, please Click Here

Diverse data privacy laws, geographical nuances and evolving privacy case law pose continued complications for cross-border discovery. While a renewed Privacy Shield transfer mechanism may clear some of the fog around cross-Atlantic data transfers, those working on the front lines of discovery continually must look to innovative strategies for mitigating privacy risks in discovery. 

Join ProSearch experts Ryan Costello and Gina Taranto for an inside look at the latest challenges in protecting private data in discovery, as well as some best practices and practical steps for supporting your eDiscovery battle plans and data privacy compliance aims.

 

To register for the upcoming live webinar, please Click Here

More Webcasts

Generative AI for Li...

Explore the transformative potential of generative AI in modern litigation. “Generative AI for...

First Amendment/Expr...

The Protections and Limits of the First Amendment when it comes to Expressive Conduct. This PowerPoi...

Freedom of Informati...

During this course, we will go over your rights under the Freedom of Information Act (FOIA) and Priv...

The Bulk Sensitive D...

The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...

Best Behavior: Effec...

This program will address the ethical obligations of Lawyer Advocates representing clients in arbitr...

Dealing with Difficu...

Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...

Communication, Trust...

Effective representation depends on trust, communication, and responsiveness, yet these can break do...

White Collar Sentenc...

This program examines mitigation strategies for white-collar defendants in the post-Booker sentencin...

2026 Consumer Protec...

State attorneys general continue to play a central and increasingly aggressive role in consumer prot...

Cybersecurity Compli...

This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...