chronology

Technology To Address Proposed ISO 15489 for Records Management

Technology To Address Proposed ISO 15489 for Records Management

The International Standards Organization (“ISO”) is considering revisions to ISO 15489 that deals with the “creation, capture and management of records.” The draft is available for comment until March 23, 2015. Organizations should consider the concepts set forth in this standard as they design, build, and maintain their records management infrastructure.


Predictive Coding: Recall Calculations to the Rescue

Predictive Coding: Recall Calculations to the Rescue

In 2015, astute ediscovery practitioners are looking for ways to take predictive coding to new heights using recall calculations. Ralph Losey, a leader in the e-discovery and predictive coding field, has devised a new approach to recall and precision accuracy measurement. What is this formula and how is it more effective than previous systems? In this episode of The ESI Report , Michele Lange interviews Ralph Losey about ei-Recall, a calculation he formulated for measuring the recall of electronic discovery processes. In a very comprehensible interview, Losey explains what recall and precision are in the e-discovery field.


Everything You Really Need to Know About Docker

Everything You Really Need to Know About Docker

A two-year-old technology is at the spearhead of a genuine revolution in data center architectures, for both software and hardware.


Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Ethical Issues Implicated by Lawyers’ Use of Third-Party Cloud Services

Recent amendments to the ABA Model Rules of Professional Conduct (Model Rules) indicate less leeway for lawyers who inadvertently violate their ethical obligations through the use of technology, including such ubiquitous services as cloud computing.


Medical Identity Theft Costs Victims $13,450 Apiece

Medical Identity Theft Costs Victims $13,450 Apiece

New study shows not only is medical identity fraud costly for individuals, it’s happening a lot more often. Having steadily grown over the past five years, medical identity theft increased by a whopping 21.7 percent in 2014, according to a new report conducted by the Ponemon Institute on behalf of the Medical Identity Fraud Alliance (MIFA).


The Promise of Medical Technology? Managing the Management of InfoTech (Cartoon and Clip)

The Promise of Medical Technology? Managing the Management of InfoTech (Cartoon and Clip)

Daily we read, see and hear more and more about the role and responsibility of technology in the practice and management of medicine. This week’s cartoon and clip highlights the promise of technology in the practice of medicine (cartoon) and provides links to six interesting articles related to the management of medical information and technology (clip).


Best Practices: Protecting Privilege – The Impact of Dual Indexing

Best Practices: Protecting Privilege - The Impact of Dual Indexing

Lexbe’s Dual Index approach captures hidden office file text including headers, footers, comments, tracked changes, and notes. Additionally, Lexbe is able to index embedded text and other visuals to ensure that all of a documents data is made searchable for review.


10 Tips for Crafting a Document Retention Policy

10 Tips for Crafting a Document Retention Policy

Many companies have document retention policies that are known only to records and information technology employees. These companies overlook the fact that the reach of the records department or IT staff has limits—in fact, at many companies employees have unfettered control in the creation and maintenance of data on local computers, in hard copy and, of course, on their personal devices. Those employees need to know and follow the company’s document retention policy, and that policy should be simple and broad enough to inform even the least-technically inclined in the company’s ranks.


Evaluating Opposing Parties’ eDiscovery & Scanned Document Productions

Evaluating Opposing Parties' eDiscovery & Scanned Document Productions

Much has been written about how to use advanced tools to select and produce electronic discovery. However, for every producing party there is a requesting party that has to review and analyze the produced documents. While producing parties have detailed knowledge about what was searched, the limitations of any tools used, and the criteria used for selection, requesting parties lack this insight. They have to get a handle on what was in the current production and ideally compare productions from the same party in related matters or compare productions from comparable litigation. The Equalizer: Visual Classification.


Healthcare Industry Poised to Take Giant Leap into the Cloud

Healthcare Industry Poised to Take Giant Leap into the Cloud

With the global market for electronic health records expected to exceed $22 billion by the end of this year, healthcare providers are shifting their focus on big data analytics and cloud computing to improve patient health information management.


“PhysTexting” Is Not Enough to Form a Patient-Physician Relationship

“PhysTexting” Is Not Enough to Form a Patient-Physician Relationship

A defined physician-patient relationship requires that the physician establish a “diagnosis through the use of acceptable medical practices, which includes documenting and performing: … [a] physical examination that must be performed by either a face-to-face visit or in-person evaluation … and appropriate diagnostic and laboratory testing.”


Ennui: Have We Grown Weary of e-Discovery?

Ennui: Have We Grown Weary of e-Discovery?

“Ennui” aptly describes what I’m seeing in the e-discovery world. We are bored with e-discovery. It hasn’t gone away, as some foolishly imagined it might. Most have endured rather than embraced e-discovery.


Big Data Land Mines for Insurers To Avoid In 2015

Big Data Land Mines for Insurers To Avoid In 2015

Before data was big, Google was a verb, or Gordon Moore wrote his law, insurers were using math and statistics to predict the future. As early as the 2 nd millennia BC, Babylonian sea merchants paid lenders extra for a promise of help if their ship was to sink. They set prices by correlating data points to calculate the likelihood and potential cost of a disaster at sea. Data was sparse, and one would assume neither merchant nor lender consistently got a good deal. In 2015, property, casualty, life and health insurance companies are awash in data.


Visual Classification: An Emerging Foundational Technology for Information Governance Initiatives

Visual Classification: An Emerging Foundational Technology for Information Governance Initiatives

This new technology overview provides an overview of new visual classification technology. It is written for information governance technologists and practitioners who want to advise clients on the current state of the art. It is also profitable for information governance stakeholders who want to undertake document-related information governance initiatives without the restrictions and limitations of prior technologies.


John Tredennick And Mark Noel Of Catalyst, On Technology Assisted Review

John Tredennick And Mark Noel Of Catalyst, On Technology Assisted Review

Many people are realizing that they have to change the way they work. And tools like technology assisted review are changing the way attorneys work. But it’s not going to replace them. TAR tools can quickly analyze millions of documents for subtle patterns, but only humans can decide what’s important to the case, or what stories the documents can tell. So these systems are hybrids: The machines do what they do best, and the humans do what they do best. There will be plenty of work to go around for skilled practitioners who know the tools and have the right skillsets.


Success Means Back to Basics for Content Management

Success Means Back to Basics for Content Management

Auto-classification tools are advancing rapidly for declaring records. Microsoft showed its faith in the technology with its Equivio buy. OpenText is pushing the technology into email, sharing stories from the US Federal space with its at times staggering volume of email. Even the cloud vendors are jumping on board: Box announced plans to have auto-classification in its platform this year.


Sweep Reveals Scale of Cookie Consent Non-Compliance

Sweep Reveals Scale of Cookie Consent Non-Compliance

The results of an international investigation into the cookie consent practices of 478 websites frequently visited by European citizens have now been published. The outcome is perhaps unsurprising: cookies are used en masse by websites operating in Europe, their expiry dates are often excessive, and crucially, not enough is being done to provide notice and obtain valid consent for the use of cookies and other device identifying technologies.


The Simplicity of Technology? Enhancing InfoGov And eDiscovery (Cartoon and Clip)

The Simplicity of Technology? Enhancing InfoGov And eDiscovery (Cartoon and Clip)

Daily we read, see and hear more and more about the impact new technologies can make on the practice of information governance (IG) and eDiscovery (EDD). This week’s cartoon and clip highlights the simplicity of many of these new IG and EDD offerings (cartoon) and provides quick links to two new overviews that highlight technologies that are changing the way legal and IT professionals think about the practice of IG and EDD (clip).


Big Surprise! – There will be no Privacy in the Future, and IoT is Part of the Problem!

Big Surprise! – There will be no Privacy in the Future, and IoT is Part of the Problem!

Pew research report “ The Future of Privacy ” indicated by 2015 that 55% of the 2,211 respondents no one should really expect any privacy and that the IoT (Internet of Things) will make things worse.


eDiscovery Challenges: Challenges Faced By Environmental Lawyers

eDiscovery Challenges: Challenges Faced By Environmental Lawyers

Those practicing environmental law face unique litigation challenges in advocating on behalf of their clients. Rapidly growing collections of electronically stored information (ESI) present an increasingly large obstacle when taking on resource-rich private firms. Environmental attorneys can frequently find themselves taking on data-intensive cases that overwhelm existing document review and production capabilities.


TAR for Smart People – New eBook

TAR for Smart People - New eBook

By John Tredennick How Technology Assisted Review Works and Why it Matters for Legal Professionals Technology Assisted Review has been a game changer for e-discovery professionals, offering dramatic savings in both time and review costs for savvy clients and their legal counsel. This book confronts the difficult issues with the first generation of TAR applications, […]


10 Things Not to Do at a LegalTech Meeting

10 Things Not to Do at a LegalTech Meeting

Call it ‘best intentions’ while underestimating the seductive power of the temptation to spiel. I found myself making notes on what NOT to do while presenting to a prospect instead of my usual key take-away bullets. So here are some of my slightly tongue-in-cheek pointers. If we did a meeting in NY, just assume that I am talking about someone else for the sake of your ego.


Florida is the Latest State to Allow Attorneys to Advise Clients About the Removal of Social Media Posts and Pictures

Florida is the Latest State to Allow Attorneys to Advise Clients About the Removal of Social Media Posts and Pictures

On January 23, 2015, the Professional Ethics Committee of the Florida Bar issued an advisory opinion holding that before litigation commences , and absent any other preservation obligation, an attorney may advise a client to: (1) remove information from social media pages and (2) change privacy settings from public to private, as long as the client retains a record of any deleted information or data.


Cybersecurity and Privacy Diligence in a Post-Breach World

Cybersecurity and Privacy Diligence in a Post-Breach World

In November 2014—just two weeks after Admiral Michael Rogers, director of the National Security Agency, testified to the House Intelligence Committee that certain nation-state actors had the capability of “infiltrating the networks of industrial-control systems, the electronic brains behind infrastructure like the electrical grid, nuclear power plants, air traffic control and subway systems”—Sony Pictures announced it had experienced a major cyber-attack, one many sources believe was likely perpetrated by or on behalf of a nation-state. This destructive cyber-attack was a game-changer for corporate America because it became clear that hackers are not simply focused on credit card numbers or personal information. Indeed, the attack on Sony was designed to steal the Company’s intellectual property, disseminate personal emails of high-ranking executives, and destroy Sony servers and hard drives, rendering them useless.