The European Court of Justice this morning decided to go along with last month’s opinion from advocate general Yves Bot and declare the 15-year-old deal invalid.
Companies are delving into vast amounts of data to spot previously hidden perils and manage risk better.
Not all clouds have a silver lining. Organizations, particularly large ones, are still struggling to determine how the cloud will fit into a true long-term information governance strategy.
Big data analysis has become a useful tool in tackling complex problems that until recently might have been all but unsolvable.
Technology is doing more than bringing compliance fully into the digital age. It’s also initiating a revolution that is putting compliance and ethics at the forefront of how business is run.
The scope of discovery is now limited to that which is “proportional.” In other words, courts will not permit discovery into expensive ESI, without a cost-benefit analysis.
So, you’re sold on developing your e-discovery expertise, but how do you go about it?
Before implementing data-governance policies, organizations need to understand what data needs to be kept and what data has no legal or business value.
However, there are a number of other ways in which Relativity can, and has, been leveraged to help companies and law firms achieve goals that do not have anything to do with litigation at all.
This Order provides a good example of the balancing act a Court must perform in connection with a subpoena for documents. The requesting party’s right to the information must be carefully balanced against the burdensomeness to the third party of complying with the subpoena.
There is a new policy at the Department of Justice that basically says corporations will not get credit for an internal inquiry on corporate wrongdoing without identifying to federal authorities which individuals are at fault and related facts.
The Umbrella Agreement covers all personal data exchanged between the European Union and the United States for the purpose of prevention, detection, investigation and prosecution of criminal offences, including terrorism.
Based on a compilation of research from analyst firms and industry expert reports in the information governance arena, the following short list of enablers highlights companies and firms that may be useful in the consideration of information governance products and services.
Whatever the case, electronic discovery (eDiscovery) has become a norm in the litigation process and organizations need to align their legal strategy to be better prepared.
Companies are using autoclassification software to get a handle on their ballooning enterprise information.
Companies able to understand who may seek to steal their trade secrets are better able to view those secrets through the lens of a threat actor, and therefore apply appropriate resources to enhance their security.
In spite of the volume of data we’re looking at in discussions of big data, generally speaking, humans don’t have to do much to enhance the quality of the content.
Attorneys need to be familiar with vendor analytics tools that can add credibility to requests for additional discovery and assist with cost estimates, in order to establish that the value of the requested ESI is expected to be in proportion to the value of the case.
This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.
Ramifications for Failing to Employ Adequate Security: A cyber incident reported by a prime or subcontractor shall not, by itself, be interpreted as evidence that the prime or subcontractor has failed to provide adequate information safeguards.
When you get the legal hold wrong, everything that follows is at risk. In VW’s case, failure won’t be given the benefit of the doubt.
In the United States, you are more likely to be hit by lightning than to be sanctioned for non-preservation of ESI.
The imperative now is to ask: “Why am I gathering this data in the first place?” And, presumably, if the answer to the first question is sufficiently business worthy, then the next question becomes even more critical: “What am I doing to organize, retain and protect this valuable data?”