On the battlefields of ancient Rome, Julius Caesar used a cipher that changed the order of the letters of the alphabet to secure messages he sent to his infantry leaders.
Decoding Encrypted Documents in Cross-Border e-Discovery
Organizations should develop a strategy to determine whether encryption will be an issue as early as possible in a case. It is also important at the outset to develop a process for handling these very complicated document sets when time is of the essence and when local privacy laws must be considered.
This premium content is locked for LawJournalNewsletters subscribers only
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN LawJournalNewsletters
- Stay current on the latest information, rulings, regulations, and trends
- Includes practical, must-have information on copyrights, royalties, AI, and more
- Tap into expert guidance from top entertainment lawyers and experts
Already have an account? Sign In Now
For enterprise-wide or corporate access, please contact Customer Service at [email protected] or call 1-877-256-2473.






