Shields Up! Protecting Private Data in eDiscovery

17 Feb , 2022

To register for the upcoming live webinar, please Click Here

Diverse data privacy laws, geographical nuances and evolving privacy case law pose continued complications for cross-border discovery. While a renewed Privacy Shield transfer mechanism may clear some of the fog around cross-Atlantic data transfers, those working on the front lines of discovery continually must look to innovative strategies for mitigating privacy risks in discovery. 

Join ProSearch experts Ryan Costello and Gina Taranto for an inside look at the latest challenges in protecting private data in discovery, as well as some best practices and practical steps for supporting your eDiscovery battle plans and data privacy compliance aims.

 

To register for the upcoming live webinar, please Click Here

More Webcasts

Real Lessons for Law...

This program, conducted by a seasoned litigation and trial lawyer, will emphasize what litigators ca...

Fair Debt Collection...

The Fair Debt Collection Practices Act (FDCPA) remains one of the most important consumer protection...

Ethical Billing in t...

Protect your practice from the ethical vulnerabilities of AI by mastering Model Rules 1.1 and 1.5. T...

Electronic Payment F...

As law firms increasingly transition from paper-based disbursements to electronic payment systems&md...

Navigating Governmen...

Contracting with the Federal Government is not like a business deal between two companies or a contr...

DEI - Legal or Illeg...

Prior to the Supreme Court’s 2023 affirmative action decision, some predicted that this ruling...

Dealing with Difficu...

Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...

Best Behavior: Effec...

This program will address the ethical obligations of Lawyer Advocates representing clients in arbitr...

2026 Consumer Protec...

State attorneys general continue to play a central and increasingly aggressive role in consumer prot...

Cybersecurity Compli...

This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...