chronology

How to Design a Document Retention Policy

How to Design a Document Retention Policy

Data minimization can be a powerful – and seemingly simple – data security measure. The term refers to retaining the least amount of personal information necessary in order for an organization to function. Less information means that there is less that the organization needs to protect, and less opportunity for information to be lost or stolen.


Nearly Two-Thirds of Confirmed Data Breaches Were Related to Password Issues

Nearly Two-Thirds of Confirmed Data Breaches Were Related to Password Issues

Verizon’s 2016 Data Breach Investigations Report doesn’t waste any time providing useful statistics regarding the state of data breaches – they state right on the cover of the report that “89% of breaches had a financial or espionage motive.”


Evaluating the Legal Cloud and the Potential for Risk

Evaluating the Legal Cloud and the Potential for Risk

As cloud applications are gaining increased acceptance in the legal world, law firms and organizations need to develop intelligent policies to mitigate risks to protect client and firm data


What is a Data Map, Anyway?

What is a Data Map, Anyway?

When dealing with a lawsuit that inevitably will require the production of electronically stored information (“ESI”), one of the first things we (as counsel) have to do is figure out where that ESI resides. But how, exactly, does one begin to determine where responsive data exists? Well, consider the client’s data map.


Panel Discusses the State of Legal Blogging in 2016

Panel Discusses the State of Legal Blogging in 2016

As blogging has become a standard feature on most legal websites, ACEDS convened a panel of some of the industry’s leading bloggers to talk about how to use blogs and social media in today’s world.


EDna Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

EDna Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


The EDna Challenge – Part Two (ACEDS Extract)

The EDna Challenge - Part Two (ACEDS Extract)

An all-star ACEDS panel led by eDiscovery expert Craig D. Ball visits the question of how to conduct eDiscovery in 2016 on a $5,000 budget.


Survey of IT Pros Highlights Lack of Understanding of SaaS Data Loss Risks

Survey of IT Pros Highlights Lack of Understanding of SaaS Data Loss Risks

It turns out that IT pros across the pond have the same concerns as here in the U.S., as the survey found that security is the top concern when moving critical applications to cloud. Specifically, 44 percent of U.S. and U.K. IT pros cited external hacking/data breaches as their top concerns, ahead of insider attacks and user error.


Are Changes in Store for the Stored Communications Act?

Are Changes in Store for the Stored Communications Act?

Last week saw action on two fronts regarding the Stored Communications Act (SCA) – the US federal statute regulating government searches of online accounts in criminal investigations.


When will AI and NLP actually turn Siri into your best friend?

When will AI and NLP actually turn Siri into your best friend?

We’re at the start of yet another software revolution. Things we take for granted — the graphical user interface (GUI) and the app — are becoming extinct, and conversational interfaces are fast becoming the new norm.


Defendant Sanctioned for Loss of Emails During Provider Switch

Defendant Sanctioned for Loss of Emails During Provider Switch

In Core Laboratories LP v. Spectrum Tracer Services, LLC et. al., No. 11-1157 (W.D. Okla. Mar. 7, 2016), Oklahoma District Judge Vicki Miles-LaGrange granted the plaintiff’s motion for sanctions for emails that were not preserved during an email provider switch via an adverse inference instruction, but denied the plaintiff’s motion for sanctions for deleting files and for wiping the computer of one of its employees.


Need to Decrypt an iPhone? There’s an “Act” for That

Need to Decrypt an iPhone? There’s an “Act” for That

A pair of recent cases pitted the U.S. Department of Justice (DOJ) against Apple, Inc. (Apple) in a Herculean struggle between asserted interests in national security and privacy.


A Look at Security with SaaS Providers

A Look at Security with SaaS Providers

Private cloud offerings including SaaS are growing in our industry largely due to the expense in maintaining hardware and security protocols for client data that law firms have traditionally managed.


Cybersecurity Compliance Just Got Tougher

Cybersecurity Compliance Just Got Tougher

While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some government entities have tried to catch up by mandating that companies take a proactive approach toward protecting personal and competitively sensitive data. The move is a departure from the traditional reactive response of simply notifying consumers after their personal data is breached.


What is Information Management?

What is Information Management?

Information, as we know it today, includes both electronic and physical information. The organizational structure must be capable of managing this information throughout the information lifecycle regardless of source or format (data, paper documents, electronic documents, audio, video, etc.) for delivery through multiple channels that may include cell phones and web interfaces.


Big Data in a Best Practices Compliance Program, Part I

Big Data in a Best Practices Compliance Program, Part I

“Big data is data that exceeds the processing capacity of conventional database systems. The data is too big, moves too fast, or doesn’t fit the strictures of your database architecture.”


ACEDS Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

ACEDS Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Get What You Pay for or You Pay for What You Get

Get What You Pay for or You Pay for What You Get

“In the final analysis, you may not always get what you pay for, but you pay for what you get. And sometimes what you pay for is more than what you thought you bargained for.”


#ACEDS2016 | Live News Feed

#ACEDS2016 | Live News Feed

The #ACEDS2016 Live News Feed provides legal and information technology professionals with quick reference to 2016 ACEDS E-Discovery Conference and Exhibition specific news via short headlines and link addresses, presented by Twitter under the hashtag #ACEDS2016.


Artificial Intelligence: Marketing Buzzword, or Reality?

Artificial Intelligence: Marketing Buzzword, or Reality?

Predictive coding, the “flavor of the day,” as Lewis put it, relies on supervised machine learning algorithms to reduce the number of documents that lawyers must review, and probably does reduce the cost of a project, he said.


The 7 Cybersecurity Habits of Secure Law Firms

The 7 Cybersecurity Habits of Secure Law Firms

As the volume and complexity of client data proliferates, protecting client confidentiality only becomes harder. Unfortunately, law firms are often soft targets for hackers because they do not invest heavily in information technology infrastructure and security.


How Smart Technology Will Shake Up the Workplace

How Smart Technology Will Shake Up the Workplace

While its potential impact on ROI is astonishing, smart tech also promises to profoundly transform workplace cultures and staffing strategies, findings reveal.


EDna: Still Cheap and Challenged

EDna: Still Cheap and Challenged

About seven years ago, I e-mailed a hypothetical to colleagues seeking their advice about how to process and review an unprepossessing volume of ESI for production in e-discovery. The intelligence they shared became fodder for The EDna Challenge and, I like to think, helped promote lower cost e-discovery options in the marketplace.


Law Firms Must Adapt to Market Segmentation

Law Firms Must Adapt to Market Segmentation

The law firm of the future recognizes what it does best and for whom. It segments its services and fees by the nature of the work, with a menu of services with rates for each. It follows a “best in breed model” for those things that it does well, and positions itself as one of the stable of law firms on the clients’ preferred provider list. The foundation is the delivery model for each service, with differentiated cost, talent models, and profit structures. The art is in how to bundle and price the services for the big customers, and the services that the others get.