Mark Diamond, president and CEO of the IG consulting firm Contoural, has been a vocal supporter of IG task forces, likening them to the NASA mission control teams that help guide rockets and shuttles into space. At this year’s National Conference on Managing Electronic Records, Diamond moderated the keynote panel discussion “Making the Moonshot: Launching Your Information Governance Program.”
“…Big Data is creating data swamps even in the best intentioned efforts…Analysts will still spend up to 80% of their time just trying to create the data set to draw insights.”
Cleansing and normalizing unstructured data is a highly technical and time-consuming task.
Mobile technology is becoming more central to eDiscovery. Texting, mobile apps, and social media are the “new frontier” in eDiscovery.
On the surface, a search engine and an analytics engine seem to be serving very different purposes, and they are usually accessed through vastly different interfaces. But when you scratch under that surface, how different are search and analytics, really?
No matter which cloud you’re adopting, your cloud data protection best practices will remain the same: the first step will always be to identify and classify which data must be protected.
In order to provide a quick window into the state of Fiscal Year 2016 IT spending within DoD, we have developed three graphics to help paint a picture of what’s happening with the military’s IT money.
Many of the survey participants acknowledged that they have yet to implement even basic cyber security protocol.
The Open Container Initiative (OCI,) the peace project between CoreOS, Inc. and Docker, Inc. that put an end to the Container Wars back in June , received a boost Wednesday with news that 14 new companies had signed up.
Unlike some other risk assessments in the compliance field, there is value to conducting a risk assessment in the AML space. Looking at geography, business and individual relationships, and numerous product lines, the risk assessment can help to organize risks, focus on measurement and look at remediation. The exact design and tailoring of the compliance program should be laid on a foundation created by the risk assessment.
The problem with technology-assisted review is that the best practices to bring about the most accurate, defensible review are, quite frankly, too onerous for most attorneys to accept.
Estimating the size of the eDiscovery market is notoriously difficult, which helps explain why there have been three vastly different recent estimates of its size.
Whether they should or not, maybe they can – if they’re found NOT to be practicing law, according to a ruling from the Second U.S. Circuit Court of Appeals.
While having lawyers that are experienced with e-discovery is important, their hands will be tied unless the client has taken steps to prepare for e-discovery.
This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.
The CVS experiment may cost the drugstore chain more than it bargained for—not just in lost sales for one week, but in the loss of loyalty among customers.
Lawyers that aren’t mindful of their preservation obligations may expose their clients, and themselves, to significant sanctions because they didn’t take appropriate steps under the circumstances to ensure that potentially relevant information is preserved.
A trend toward classifying [document review] as ‘non-legal’ could result in clients refusing to pay for skilled workers to take on such assignments, causing the work to ‘get pushed down to the lowest common denominator’.
Implementing common sense approaches to data protection and staying true to industry trends will likely provide significant protection for secrets, even as industry continues to push those secrets into the cloud.
Steganography is a dual use technology which can be used for the important goal of protecting sensitive communications and improper goal of hiding otherwise discoverable legacy communications.
The Biomet case very clearly shows the dangers of over-reliance on keyword filtering.
That a special master would be required to help the parties – where they entered into a predictive coding use protocol – seems counterintuitive and underscores the need for counsel to proceed with caution before agreeing to such protocols.
The Maturity Model for Information Governance begins to paint a more complete picture of what effective information governance looks like. It is based on the eight Principles as well as a foundation of standards, best practices, and legal/regulatory requirements. The maturity model goes beyond a mere statement of the principles by beginning to define characteristics of various levels of recordkeeping programs.