Linked: 46% of employees would not share data to improve wellbeing support
I do think this is going to be one of the big balancing acts that organizations are going to have to conduct when it comes to wellbeing. How do I keep track of how my employees are doing, without...
View ArticleLinked: Spyware meant to track terrorists was used against journalists, too
Yeah, no one ever misuses these kinds of tools, right? Nope, nothing to worry about here, they are only ever used to target bad guys. You have nothing to fear from them. Whatever.… Read More The post...
View ArticleApple’s Image Scanning Tool is, Well, Complicated
At first blush, the idea of scanning images synced up to iCloud for child sexual abuse materials against the hash list of known CSAM images seems like a good idea. As a survivor of childhood sexual...
View ArticleGood Information on the Current State of the eDiscovery Job Market
I tuned into a webinar yesterday put on by ACEDS, and then saw today that Jared Coseglia, from TRU Staffing Partners, had posted an article with many of the same points he mentioned on the webinar. If...
View ArticleShared Links (weekly) November 7, 2021
Why You Should Never Hesitate to Take a Mental Health Day 5 Side Effects of Working Too Much Use of Ephemeral Messaging Apps Can Make Your Document Retention Policy Disappear Electronic Discovery...
View ArticleShared Links (weekly) Dec. 19, 2021
Supporting mental health during the holiday And when is the shift over?- "In a competitive marketplace, self-regulating the length of our shift is a lot to ask. Given that the list of things to do is...
View ArticleShared Links (weekly) Jan. 30, 2022
Cybersecurity Is Broken: How We Got Here & How to Start Fixing It Report: IT staff fail phishing tests more often than non-technical workers- overconfident much? Data Privacy: Four Ways to Raise...
View ArticleLinked: Data breaches happen constantly and there are very little consequences
This is the crux of the problem. Personal information is going to be breached, eventually. There is no 100% secure data. None. No business, government entity, non-profit, or any other place that...
View ArticleLinked: Data From Fake Legal Requests Used to Sexually Extort Minors
In this case, we have an emergency process. There are good reasons to have that process, if someone is threatening violence to themselves on social media, it's useful for the tech company to share some...
View ArticleShared Links (weekly) May 22, 2022
We Need to Confront America’s ‘Justice Gap’ Women in cybersecurity: Shattering the myths, once and for all Feeding the Frenzy? Summer 2022 eDiscovery Pricing Survey Results 5 States of Consumer...
View ArticleShared Links (weekly) June 19, 2022
The unrelenting threat of ransomware is pushing cybersecurity workers to quit Hackers are now hiding inside networks for longer. That's not a good sign Using Collaboration Tools Instead of Email? Know...
View ArticleShared Links (weekly) July 3, 2022
Search Term and Form of Production Dispute, but Let’s Not Forget How Predictive Coding Can Help The Ultimate Guide to Team Communication New Firefox privacy feature strips URLs of tracking parameters...
View ArticleShared Links (weekly) Aug. 7, 2022
Too Connected: How E-Discovery Professionals Can Avoid Burnout Ten workplace mental health statistics you should know in 2022 Regular Discussions Can Help You Achieve Your Career Goals New York...
View ArticleShared Links (weekly) Aug. 28, 2022
A Constant Struggle: 3 E-Discovery Pitfalls With New Data Types Labels: Not Just for People Anymore! Ongoing phishing campaign can hack you even when you’re protected with MFA Webinar Recording: An...
View ArticleShared Links (weekly) Sept. 4, 2022
Get Your Free Privacy Email Address From DuckDuckGo The Psychology of Quiet Quitting Shedding Light on Shadow IT in eDiscovery - Part 1 “Oh, By the Way …”: How to Recover Spontaneity in the Hybrid...
View ArticleShared Links (weekly) Oct. 23 2022
U.S. Surgeon General Releases New Framework for Mental Health & Well-Being in the Workplace Let Go of the Learning Baggage Effectively Adopting New Technology in Your Law Firm Cybersecurity...
View ArticleShared Links (weekly) Dec. 11 2022
Why Meetings Are Terrible for Happiness 6 Ways Your Privacy and Security Were Threatened in 2022 15 Things Companies Should Stop Doing If They Want To Improve Their Cybersecurity Looking Back at 2022...
View ArticleQuick Thought – The Data Isn’t Safe – Bake in Privacy and Security
Of course, when we create new laws or tools, we focus on the problem in front of us. Whether that be, in this case, trying to enforce an age restriction or requiring identity verification in some odd...
View ArticleLinked – A researcher tried to buy mental health data. It was surprisingly easy.
The US government spends a lot of time telling people to fear what Chinese companies could do with the data they get from our phones when we use something like TikTok, but they do nothing about things...
View ArticleCongressional Think Tank Sees the Problem with Age Verification – Members Not...
Proving your identity and your age eliminates the ability for anyone to remain anonymous. You might argue that is a good thing, but I'll take the opposite side. There are plenty of reasons for someone...
View Article