James Sherer Co-Authors Article on Technological and Information Governance Approaches to Data Loss and Leakage Mitigation

Articles / March 24, 2017

Partner James Sherer co-authored an article titled “Technological and Information Governance Approaches to Data Loss and Leakage Mitigation” as part of the March 8-9, 2017, proceedings of the 12th International Conference on Cyber Warfare and Security (ICCWS 2017). The article addresses the concept of “data leakage,” or instances where organizations lose access to or control over their important data, especially in the context of insider threats.

In this article, the authors focused on the problems employees may present in connection with data loss prevention or “DLP” strategies. The article also examines the different types of data leakage, including both damage to and disappearance of data; discusses how automatic data loss may occur given the operation of internal information technology systems; and considers how data loss generally may affect internal and external stakeholders as well as the public at large.

Read the article.


In The Blogs

Previous Next
Discovery Advocate
eDiscovery and Technology
By Karen DeSouza, Nkosi D. Shields
May 3, 2018
Should All States Require Continuing Technology Education (CTE)? For more than five years we have discussed the need for attorney competence in technology, especially as related to discovery in posts like this one and this one. As...
Discovery Advocate
What the Working Party might be Thinking about Discovery – WP 261 Derogations to the GDPR
By James A. Sherer, Nichole L. Sterling
April 23, 2018
On Feb. 6, 2018, the Article 29 Working Party (Working Party 29) published Working Paper 261 (WP 261), which provided guidance on the provisions of Article 49 of the European Union’s (EU) General Data Protection Regulation (GDPR). This...
Discovery Advocate
What Judges are really saying about Technology Assisted Review
By Csilla Boga-Lofaro, David Choi, James A. Sherer
April 6, 2018
Since the first judicial opinion endorsing the use of Technology Assisted Review (or TAR) was written by Judge Andrew J. Peck in 2012, an entire legal industry has grown up on the premise of streamlining the document review process in...
Discovery Advocate
Social Media Privacy Settings May Not Protect Your Information From Discovery
By Carey S. Busen
March 15, 2018
Users of social media are likely familiar with privacy settings, and understand that setting their profiles to “private” ensures that people who are not friends, connections or followers cannot view their information and postings. However...
Discovery Advocate
What Controls: The Location of the Data or the Location of the Searches for the Data?
By Emily R. Fedeles, Jennifer A. Mills, Nichole L. Sterling
March 1, 2018
The U.S. Supreme Court recently heard oral arguments in U.S. v. Microsoft, tackling the question of whether an organization can refuse to disclose foreign-stored data sought by the U.S. government through domestic warrants. Currently, the...