Can Cyber Breach Investigation Reports Be Protected Work Product?
In the recent cases of In re Capital One and Wengui, courts consider whether and when a cybersecurity vendor’s breach investigation report can be protected work product
In the recent cases of In re Capital One and Wengui, courts consider whether and when a cybersecurity vendor’s breach investigation report can be protected work product
A United States District Judge finds screenshots of social media messages an inadequate substitute for spoliated native files and excludes all related evidence and testimony