1. EachPod
EachPod
Digital Detectives - Podcast

Digital Detectives

Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.

Business Technology Tech News News
Update frequency
every 30 days
Average duration
28 minutes
Episodes
158
Years Active
2010 - 2025
Share to:
Hillary Clinton’s Emails and the Looming Issue of Shadow IT

Hillary Clinton’s Emails and the Looming Issue of Shadow IT

Sharon Nelson and John Simek interview Jason R. Baron, of counsel to Drinker Biddle & Reath, LLP and co-chair of The Information Governance Initiative, about the Hillary Clinton controversy and the f…
00:30:26  |   Thu 03 Sep 2015
Why are Law Firms Beginning to Form Data Breach Practice Groups?

Why are Law Firms Beginning to Form Data Breach Practice Groups?

Recently, data breaches have become one of the most serious threats to companies worldwide, and as more corporate infrastructure moves online, studies suggest that the rising number of data breaches …
00:30:07  |   Wed 26 Aug 2015
E-Discovery Reflections from Retired Magistrate Judge John Facciola

E-Discovery Reflections from Retired Magistrate Judge John Facciola

On this episode of Digital Detectives, Sharon Nelson and John Simek interview Judge Facciola about why lawyers need to learn about e-discovery now, how we can integrate e-discovery training into law …
00:28:20  |   Thu 23 Jul 2015
Lawmageddon and How to Prepare for Social Media in the Courtroom

Lawmageddon and How to Prepare for Social Media in the Courtroom

In this episode of Digital Detectives, Sharon Nelson and John Simek interview Nathaniel Russell about his definition of Lawmageddon, what the legal profession needs to embrace these changes, and the …
00:33:06  |   Mon 08 Jun 2015
Judge Andrew Peck on TAR (Technology-Assisted Review)

Judge Andrew Peck on TAR (Technology-Assisted Review)

In this episode of Digital Detectives, Sharon Nelson and John Simek interview Judge Andrew Peck, an expert in issues relating to electronic discovery. Together they discuss the current state of techn…
00:28:32  |   Fri 08 May 2015
The Law of Robotics: Autonomy, Responsibility, and Risk

The Law of Robotics: Autonomy, Responsibility, and Risk

From self-driving cars and drones to robotic surgeons and soldiers, humans are delegating more tasks to machines and software. But who is responsible when then these new innovations cause damage, inj…
00:27:56  |   Tue 31 Mar 2015
Forensic Science in the Criminal Justice System: What is Admissible?

Forensic Science in the Criminal Justice System: What is Admissible?

In this episode of Digital Detectives, Sharon Nelson and John Simek interview Judge David Waxse about the 2009 report by the National Academy of Sciences (NAS), the relationship between bad science a…
00:29:28  |   Thu 26 Feb 2015
The Government’s Dark Data: A Decade of Discovery

The Government’s Dark Data: A Decade of Discovery

In this episode of Digital Detectives, Sharon Nelson and John Simek interview Jason Baron about information governance, dark data, open government, and his role in The Decade of Discovery. Baron talk…
00:25:27  |   Wed 21 Jan 2015
The Sony Hack: You Can’t Keep the Barbarians Outside the Gate

The Sony Hack: You Can’t Keep the Barbarians Outside the Gate

In November of 2014, hackers infiltrated Sony's computer network lifting terabytes of corporate data, human resources information, internal intel, films, corporate emails, and other valuable informat…
00:30:56  |   Fri 16 Jan 2015
Issues and Trends in E-Discovery and Information Governance

Issues and Trends in E-Discovery and Information Governance

As lawyers, we hear a lot about the technological advances in e-discovery and information governance. How do you describe the current state of e-discovery from an opportunity and growth perspective, …
00:27:51  |   Tue 16 Dec 2014
War & Terrorism in Cyberspace: Wild, Wild West Shoot Out on the International Frontiers

War & Terrorism in Cyberspace: Wild, Wild West Shoot Out on the International Frontiers

"A cyber attack on the World Trade Center would be 10 times more financially damaging than the 2001 attack." Data breaches like the ones at Target, JP Morgan, and Home Depot have recently been all ov…
00:31:32  |   Thu 13 Nov 2014
Predictive Coding for Rookies: E-Discovery in the Courtroom

Predictive Coding for Rookies: E-Discovery in the Courtroom

Discovery, as all lawyers know, is the process of collecting and exchanging information about the court case to prepare for the trial. Traditionally, this was done by many lawyers over countless bill…
00:35:00  |   Mon 27 Oct 2014
Rule 37(e) of the Federal Rules of Civil Procedure: Changes for ESI Preservation and Spoliation

Rule 37(e) of the Federal Rules of Civil Procedure: Changes for ESI Preservation and Spoliation

In 2006, the Federal Rules of Civil Procedure rule-makers developed and put into practice amendments dealing with electronically stored information (ESI) and e-discovery. However, most of those invol…
00:27:35  |   Wed 24 Sep 2014
Cull, Baby, Cull - Modern Trends in Data Collection and Analysis

Cull, Baby, Cull - Modern Trends in Data Collection and Analysis

Despite all the attention that e-discovery has received over the last decade, it is still a relatively new part of the litigation process. For those lawyers who were never exposed to e-discovery in l…
00:31:27  |   Mon 18 Aug 2014
Data Breaches, eDiscovery, and the Importance of Digital Forensics

Data Breaches, eDiscovery, and the Importance of Digital Forensics

Every law firm can run into incidents of employee misconduct, data breaches, and intellectual property theft. In the age of modern technology, data breaches, insider trading, and other security probl…
00:23:38  |   Mon 28 Jul 2014
77% of Lawyers Can’t Be Trusted With Confidential Client Data

77% of Lawyers Can’t Be Trusted With Confidential Client Data

All lawyers have an ethical obligation to employ security measures when sharing information and data with their clients. Whether that means encrypting all important emails or properly researching clo…
00:25:49  |   Mon 07 Jul 2014
The FBI’s Massive Facial Recognition Database: Privacy Implications

The FBI’s Massive Facial Recognition Database: Privacy Implications

On February 12th of 2008, the FBI announced that it had hired Lockheed Martin to build its Next Generation Identification system (NGI) to deploy multimodal matching to biometric data of US citizens. …
00:21:33  |   Sat 24 May 2014
Perils of Law Firms Possessing Massive Amounts of Unreviewed Client Data

Perils of Law Firms Possessing Massive Amounts of Unreviewed Client Data

Some experts believe that, in addition to being prohibitively expensive for law firms to manage, maintaining immense amounts of client data increases the probability that it will be exposed to the pu…
00:24:58  |   Fri 11 Apr 2014
The Ethical Implications of NSA Surveillance for Lawyers

The Ethical Implications of NSA Surveillance for Lawyers

Some technology experts believe it's not a matter of if law firm communications can be hacked, but when. With continuing reports of the NSA and foreign entities monitoring the privileged attorney-cli…
00:25:22  |   Fri 21 Mar 2014
The Kindergarten Version of Information Security for Lawyers

The Kindergarten Version of Information Security for Lawyers

From malware and hackers to BYOD and TYOD, the biggest threat to law firm data could be the attorneys themselves. On this episode of Digital Detectives, hosts Sharon D. Nelson and John W. Simek inter…
00:27:01  |   Mon 24 Feb 2014
Disclaimer: The podcast and artwork embedded on this page are the property of Legal Talk Network. This content is not affiliated with or endorsed by eachpod.com.