During the ups and downs of the current COVID-19 lock-down, many of our clients have ongoing e-discovery needs as they continue to operate their businesses and litigation matters.
Last week, when a client approached us with an urgent review project, we mobilized a team to respond. We conducted a remote training session with a blended team of 60 people, including McCarthy Tétrault lawyers and MT>3 reviewers.
A secure video-conferencing application was used to conduct the training, which allowed us to host the large group, monitor attendance, and securely share encrypted materials. Team engagement was strong and use of the chat feature along with the video conferencing helped everyone connect and collaborate. Materials were circulated securely and were password protected to ensure confidentiality.
Some tips for setting up your own virtual meeting include, learning about and testing your conferencing tool prior to your meeting. Troubleshoot any potential connectivity issues in advance. If you are using the tools for the first time, have your team login 10 minutes early to ensure all are able to connect. Think through how your team will be using the tool. Keep security top of mind when considering how work will be done, including how materials will be circulated. Ensure that you understand the level of encryption on shared platforms and software. As the use of this technology will only increase, now is a great time to get on board.
*The English version will follow*
Les Principes de Sedona Canada concernant l’administration de la preuve électronique, deuxième édition est maintenant disponible en français. La première édition des Principes de Sedona Canada concernant l’administration de la preuve électronique a été publiée en 2008 et a immédiatement été reconnue et utilisée par les juristes aux niveaux fédéral et provincial. Elle s’est révélée être un outil indispensable pour tous ceux et celles qui travaillent dans le domaine de l’administration de la preuve électronique. Depuis lors, l’administration de la preuve électronique a évolué considérablement et la deuxième édition a été créée pour tenir comptes de ces changements.
Une copie des Principes de Sedona Canada concernant l’administration de la preuve électronique, deuxième édition peut être consultée ici.
The Sedona Canada Principles Addressing Electronic Discovery, 2nd Edition is now available in French. The 1st edition of The Sedona Canada Principles Addressing Electronic Discovery was published in 2008 and was immediately recognized and used by Canadian jurists at the Provincial and Federal Level. It has proven to be an indispensable tool for those working in e-Discovery. Since then, e-Discovery has evolved drastically, and the 2nd Edition has been created to take about account those changes.
A copy of The Sedona Canada Principles Addressing Electronic Discovery, 2nd Edition can be found here.
Clearview AI is a startup that compiles billions of photos for facial recognition technology and works with approximately 600 law enforcement agencies across North America, including the Toronto Police Service.
In a recent statement, Clearview said it lost its entire client list to hackers. Tor Ekeland, an attorney working for Clearview, said in a statement to The Daily Beast: “Unfortunately, data breaches are part of life in the 21st century. Our servers were never accessed. We patched the flaw, and continue to work to strengthen our security.”
We have all seen the typical heist movie, where robbers target impenetrable bank vaults, give up on that option, and wait until the goods are transferred in a less secure method (i.e. an armored car). What happened here is akin to targeting armored cars. Knowing that Clearview has dedicated significant resources to protecting their data, with the client list in hand, hackers can now target the potentially less secure clients instead.
Accepting that a data breach is inevitable is becoming the new “normal” as hackers are finding ways around the most secure vaults. Contact us to learn more about how to protect your organization's data from both direct and indirect data breaches.