chronology

IG and ‘Mission Control’: Launching the Future of Healthcare

IG and ‘Mission Control’: Launching the Future of Healthcare

Mark Diamond, president and CEO of the IG consulting firm Contoural, has been a vocal supporter of IG task forces, likening them to the NASA mission control teams that help guide rockets and shuttles into space. At this year’s National Conference on Managing Electronic Records, Diamond moderated the keynote panel discussion “Making the Moonshot: Launching Your Information Governance Program.”


If I Sue My Employer Can They Access My Private Social Media Account?

If I Sue My Employer Can They Access My Private Social Media Account?

The discovery of social media content is allowed when it will likely lead to admissible evidence in the instant case. Specifically in an employment lawsuit, social media content relating to a party’s workplace conduct and state of mind at the time of the alleged events is discoverable information.


Avoiding Data Swamps with Big Data Governance

Avoiding Data Swamps with Big Data Governance

“…Big Data is creating data swamps even in the best intentioned efforts…Analysts will still spend up to 80% of their time just trying to create the data set to draw insights.”


Simplify Data Cleansing for More Accurate, Timely Analytics

Simplify Data Cleansing for More Accurate, Timely Analytics

Cleansing and normalizing unstructured data is a highly technical and time-consuming task.


Corporate eDiscovery Is Complicated by Texting, Mobile, and Social Media

Corporate eDiscovery Is Complicated by Texting, Mobile, and Social Media

Mobile technology is becoming more central to eDiscovery. Texting, mobile apps, and social media are the “new frontier” in eDiscovery.


Search versus Analytics: What is the Difference?

Search versus Analytics: What is the Difference?

On the surface, a search engine and an analytics engine seem to be serving very different purposes, and they are usually accessed through vastly different interfaces. But when you scratch under that surface, how different are search and analytics, really?


Cloud Data Protection 101: Data Classification

Cloud Data Protection 101: Data Classification

No matter which cloud you’re adopting, your cloud data protection best practices will remain the same: the first step will always be to identify and classify which data must be protected.


The State of DoD IT Spending – in Three Charts

The State of DoD IT Spending - in Three Charts

In order to provide a quick window into the state of Fiscal Year 2016 IT spending within DoD, we have developed three graphics to help paint a picture of what’s happening with the military’s IT money.


Survey: Ignorance About Cybersecurity at Corporate Law Departments Still Pervasive

Survey: Ignorance About Cybersecurity at Corporate Law Departments Still Pervasive

Many of the survey participants acknowledged that they have yet to implement even basic cyber security protocol.


Open Container Initiative Gets a Boost with 14 New Members, Releases Draft Charter

Open Container Initiative Gets a Boost with 14 New Members, Releases Draft Charter

The Open Container Initiative (OCI,) the peace project between CoreOS, Inc. and Docker, Inc. that put an end to the Container Wars back in June , received a boost Wednesday with news that 14 new companies had signed up.


Ten Key Elements of an AML Compliance Program

Ten Key Elements of an AML Compliance Program

Unlike some other risk assessments in the compliance field, there is value to conducting a risk assessment in the AML space. Looking at geography, business and individual relationships, and numerous product lines, the risk assessment can help to organize risks, focus on measurement and look at remediation. The exact design and tailoring of the compliance program should be laid on a foundation created by the risk assessment.


On TAR 1.0, TAR 2.0, TAR 1.5 and … TAR 3.0?

On TAR 1.0, TAR 2.0, TAR 1.5 and … TAR 3.0?

The problem with technology-assisted review is that the best practices to bring about the most accurate, defensible review are, quite frankly, too onerous for most attorneys to accept.


Calculating the Size of the Opaque eDiscovery Market

Calculating the Size of the Opaque eDiscovery Market

Estimating the size of the eDiscovery market is notoriously difficult, which helps explain why there have been three vastly different recent estimates of its size.


Should Contract Review Attorneys Receive Overtime Pay?

Should Contract Review Attorneys Receive Overtime Pay?

Whether they should or not, maybe they can – if they’re found NOT to be practicing law, according to a ruling from the Second U.S. Circuit Court of Appeals.


To Save Money Later, Take Steps Now to Prepare for E-Discovery

To Save Money Later, Take Steps Now to Prepare for E-Discovery

While having lawyers that are experienced with e-discovery is important, their hands will be tied unless the client has taken steps to prepare for e-discovery.


Vacation Reading Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

Vacation Reading Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Don’t Sacrifice Goodwill for Good Data

Don't Sacrifice Goodwill for Good Data

The CVS experiment may cost the drugstore chain more than it bargained for—not just in lost sales for one week, but in the loss of loyalty among customers.


Necessary Ingredients for Sound Legal Holds

Necessary Ingredients for Sound Legal Holds

Lawyers that aren’t mindful of their preservation obligations may expose their clients, and themselves, to significant sanctions because they didn’t take appropriate steps under the circumstances to ensure that potentially relevant information is preserved.


Why Do GCs Pay Lawyer Rates for Document Review in eDiscovery?

Why Do GCs Pay Lawyer Rates for Document Review in eDiscovery?

A trend toward classifying [document review] as ‘non-legal’ could result in clients refusing to pay for skilled workers to take on such assignments, causing the work to ‘get pushed down to the lowest common denominator’.


Trade Secrets, Security, and Cloud Computing: Best Practices Now

Trade Secrets, Security, and Cloud Computing: Best Practices Now

Implementing common sense approaches to data protection and staying true to industry trends will likely provide significant protection for secrets, even as industry continues to push those secrets into the cloud.


Steganography and E-Discovery

Steganography and E-Discovery

Steganography is a dual use technology which can be used for the important goal of protecting sensitive communications and improper goal of hiding otherwise discoverable legacy communications.


To Cull a Mockingbird: Popular, but Risky, “Keyword” Collection Filter

To Cull a Mockingbird: Popular, but Risky, “Keyword” Collection Filter

The Biomet case very clearly shows the dangers of over-reliance on keyword filtering.


Predictive Coding Protocol Comes Under Fire as Judge Peck Appoints Special Master in Rio Tinto

Predictive Coding Protocol Comes Under Fire as Judge Peck Appoints Special Master in Rio Tinto

That a special master would be required to help the parties – where they entered into a predictive coding use protocol – seems counterintuitive and underscores the need for counsel to proceed with caution before agreeing to such protocols.


ARMA International Information Governance Maturity Model

ARMA International Information Governance Maturity Model

The Maturity Model for Information Governance begins to paint a more complete picture of what effective information governance looks like. It is based on the eight Principles as well as a foundation of standards, best practices, and legal/regulatory requirements. The maturity model goes beyond a mere statement of the principles by beginning to define characteristics of various levels of recordkeeping programs.