This edition of the newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.
The FBI recommends medical and dental healthcare entities request their respective IT services personnel to check networks for FTP servers running in anonymous mode.
DTI, a global legal process outsourcing (LPO) company providing eDiscovery, management services, litigation support, and court reporting, announced that it has completed a strategic, minority investment in Valora Technologies, Inc. Valora is a leading innovator in AutoClassification, predictive analytics and document data mining technologies for information governance, eDiscovery, and records management. The investment underscores the commitment DTI has made to investing in leading-edge information governance solutions.
Provided to help data and legal discovery professionals as they learn, understand and grow in their knowledge of eDiscovery, the following short listing of comprehensive, program-based educational resources is shared for your consideration.
The e-Discovery Team’s Legal Training Program is a comprehensive electronic discovery educational program that has been designed by lawyers for lawyers, paralegals, and law students. It is now available for free as a service to anyone interested in electronic discovery.
Based on the transformation of communication approaches and technologies the advent of the Internet, historically accepted principles of marketing communications require continuous and considerable evaluation in light of the available conduits to communicate with others.
While some law firm website developers are advising law firms to bury law blogs inside a law firm website, a just released ABA book on strategic online publishing for law firms advises just the opposite.
Best Practices for eDiscovery Searching: A Continuing Legal Education (CLE) On-Demand Presentation (1.0 Hour) prepared and presented by CloudNine. This CLE-approved webcast session will cover goals for effective searching, what to consider prior to collecting ESI that will be subject to search, mechanisms for culling prior to searching, mechanisms for improving search recall and precision, challenges to effective searching and recommended best practices for searching and validating your search results to ensure effective search results.
In one of the legal technology industry’s largest-ever funding rounds, US crowdsourced legal research platform Casetext has closed a $12m Series B funding round in order to expand the capabilities of its AI-backed automated research assistant CARA and build up its platform and business.
An abridged look at the business of eDiscovery investments through the lens of organizations that have funded eDiscovery-related companies between 2009 and today.
An abridged look at the business of eDiscovery mergers, acquisitions, and investments. The presented listing highlights key industry business moves by sharing the announcement date, acquired company, acquiring or investing company, and acquisition amount (if known) of significant eDiscovery-related mergers, acquisitions, and investments.
Impressive advances in artificial intelligence technology tailored for legal work have led some lawyers to worry that their profession may be Silicon Valley’s next victim. But recent research and even the people working on the software meant to automate legal work say the adoption of A.I. in law firms will be a slow, task-by-task process.
These awards recognize 24 firms and over 200 authors (from among more than 40,000) who published their excellent thought leadership on JD Supra in 2016.
This is the e-Discovery Team’s training course on how to do TAR (Technology Assisted Review). What TAR really means is electronic document review enhanced by active machine learning, a type of specialized Artificial Intelligence. Our method of AI-enhanced document review is called Hybrid Multimodal IST Predictive Coding 4.0. The Course is composed of sixteen classes.
Probably the most important aspect of the change process is correctly diagnosing the opportunity or issue precipitating the need for change.
AI is also beginning to help managers peer into personal aspects of job performance that used to be left up to managers’ instincts and observations.
The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider.
Document review was just the beginning. In the past few years, corporate clients have shot dead another law-firm cash cow: the due diligence phase of a merger or acquisition.
The Security Audit Questionnaire from the EDRM was designed primarily to help evaluate the security capabilities of cloud providers and third parties offering electronic discovery or managed services.
Bottom line: if your firm is using social media for business communications, you need to be capturing that communication and retaining it in a way that makes it easy to proactively supervise for potential compliance policy violations as it gets published.
Marketing is the science and art of exploring, creating, and delivering value to satisfy the needs of a target market at a profit. Marketing identifies unfulfilled needs and desires. It defines, measures and quantifies the size of the identified market and the profit potential. It pinpoints which segments the company is capable of serving best and it designs and promotes the appropriate products and services.
When choosing a cloud service provider, it’s vital that the datacenter physically reside in a region or country in which data handling and storing legislation is favorable to your company’s business interests.
The takeaway from this case – which surveys a number of cases from other jurisdictions – is that blanket requests for forensic imaging probably will not be approved without very specific parameters that describe the relevance of the information, the precise method for obtaining it, and the reason that the information cannot be obtained elsewhere.
Disputes over trade secrets and confidential information have increased dramatically in recent years. Often arising after a business hires an employee from a competitor, a proposed acquisition falls through, or information is leaked through overseas operations, these cases expose companies to large financial damages, crippling injunctions and even criminal prosecution.