chronology

Revenue and Profits on the Rise? eDiscovery Business Confidence Survey – Fall 2016 Results

Revenue and Profits on the Rise? eDiscovery Business Confidence Survey - Fall 2016 Results

The eDiscovery Business Confidence Index Survey is designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem. The term ‘business’ represents the economic factors that determine the creation, delivery, and consumption of eDiscovery services.


The Important SaaS Accounting Changes Coming in 2017

The Important SaaS Accounting Changes Coming in 2017

Starting in 2017, revenue recognition for SaaS companies will change, and SaaS startups will have more flexibility in the way they record revenue than in the past.


Five Great Reads on Information Governance and eDiscovery: Cybersecurity Edition

Five Great Reads on Information Governance and eDiscovery: Cybersecurity Edition

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


An Educational Update: E-Discovery Essentials from ACEDS

An Educational Update: E-Discovery Essentials from ACEDS

ACEDS’ E-Discovery Essentials is an interactive, self-paced course that explores, educates, and evaluates participants on key legal, technology, and management aspects associated with the discipline of eDiscovery.


Cybersecurity 2017 – The Year In Preview: HIPAA Compliance

Cybersecurity 2017 – The Year In Preview: HIPAA Compliance

Cloud services providers are subject to HIPAA as business associates even if they are unable to view PHI.


How Much to Compensate SaaS Sales Teams for New Sales, Renewals and Expansions

How Much to Compensate SaaS Sales Teams for New Sales, Renewals and Expansions

Happy customers buy more products, remain customers longer and enable SaaS startups to scale rapidly and efficiently. Developing the sales motions, customer success sophistication and compensation structures to enable this type of growth is an essential skill of enduring SaaS businesses.


CAN-SPAM Act: A Compliance Guide for Business

CAN-SPAM Act: A Compliance Guide for Business

Do you use email in your business? The CAN-SPAM Act, a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations.


Apple May Have Finally Gotten Too Big for Its Unusual Corporate Structure

Apple May Have Finally Gotten Too Big for Its Unusual Corporate Structure

There are two main ways to structure a business. You can build divisions that are built around particular lines of business or you can build functional groups that are built around particular kinds of expertise.


E-Discovery Takes the Chaos Out of Your Bankruptcy Case

E-Discovery Takes the Chaos Out of Your Bankruptcy Case

Trustees are concerned about the integrity of the data not only in preparation for possible litigation, but also because when they confirm that data to the court or other parties, their personal integrity is at stake.


Robots and Automation May Not Take Your Desk Job After All

Robots and Automation May Not Take Your Desk Job After All

We are entering the second wave of the jobs automation process, Automation 2.0. We’ve seen predictable, repeatable, physical tasks (think forklifts on the factory floor or assembly-line work) be automated. But now, just as the recruiters predicted, automating the next wave of cognitive work (think diagnosing diseases or reviewing legal documents) will prove much more difficult, slowing the process until we figure out how to do it.


Standardized Processes: Great in Theory, Not in Practice

Standardized Processes: Great in Theory, Not in Practice

It’s the dirty secret of process management. Process owners know their so-called “standard” processes do not meet the requirements of the teams expected to apply them. And they know these processes can’t be applied, which means they may as well not exist.


Three Ways Cybersecurity Can Put Your Firm Out of Business

Three Ways Cybersecurity Can Put Your Firm Out of Business

In an industry founded on the legal and ethical obligation to keep information confidential, a data breach erodes trust and may even be grounds for legal and regulatory actions.


Five Great Reads on Information Governance and eDiscovery: Business Confidence Survey Edition

Five Great Reads on Information Governance and eDiscovery: Business Confidence Survey Edition

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


What’s the Difference With E-Discovery in Canada? A Heavy ECA Focus, to Start

What's the Difference With E-Discovery in Canada? A Heavy ECA Focus, to Start

Canadian e-discovery giant Commonwealth Legal discusses the differences it expects to see in the upcoming ComplexDiscovery e-discovery business survey.


How Much Do You Really Know About Email Investigations?

How Much Do You Really Know About Email Investigations?

Twitter LinkedIn Facebook Google+ Email A photo posted by Rob Robinson (@complexdiscovery) on Nov 16, 2016 at 3:04pm PST Extract from article/interview by Zach Abramowitz So, according to my Facebook feed — and thanks to the last couple of months of news television — it seems like all Americans have suddenly become experts in email […]


The Deal and The Data: 3 Ways Cybersecurity Is Changing M&As

The Deal and The Data: 3 Ways Cybersecurity Is Changing M&As

Morrison & Foerster’s “M&A Leaders Survey” of 150 C-suite executives, investors, general counsel and other professionals found that 82 percent of respondents now place a greater emphasis on assessing the cybersecurity practices of target companies.


3 Ways E-Discovery is Safer in the Cloud than On-Premise

3 Ways E-Discovery is Safer in the Cloud than On-Premise

Many firms have the mistaken impression that their data is safest where they can “touch” it and are hesitant to move it from on-premise to the cloud. Yet, law firms aren’t actually that confident about their own security.


Learning To Trust Cloud Security

Learning To Trust Cloud Security

Cloud-centric computing is inevitable because the network, not your network, is just a conduit to allow access from trusted requestors to trusted resources.


Do Lawyers Actually Realize When They’re Using the Cloud?

Do Lawyers Actually Realize When They’re Using the Cloud?

“Law firms that elect to avoid cloud-driven solutions with the intention of offering clients greater security may not actually be providing greater security.”


Compliance: An Integral Part of Risk Management

Compliance: An Integral Part of Risk Management

Increased regulatory and ethical pressures are transforming the traditional role of compliance. Compliance departments are taking on broader responsibility for ethics, compliance, corporate culture, and social responsibility. With greater frequency, they are moving out from under the legal department into a direct reporting relationship to the CEO and/or Board, particularly in highly regulated industries.


Man and Machine in eDiscovery Edition: The Week’s Five Great Reads on Information Governance and eDiscovery

Man and Machine in eDiscovery Edition: The Week's Five Great Reads on Information Governance and eDiscovery

This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


Proportionality Is the Critical Inquiry in Federal Court Discovery

Proportionality Is the Critical Inquiry in Federal Court Discovery

The amendment to Federal Rule of Civil Procedure 26(b)(1) (which defines the scope of permissible discovery) did away with the timeworn “reasonably calculated to lead to the discovery of admissible evidence” standard.


Containers Battle Barriers in Drive to Revolutionize Software

Containers Battle Barriers in Drive to Revolutionize Software

One of today’s most disruptive information technology trends is software containers, a technology that’s poised to transform the enterprise IT landscape by revolutionizing the way software is built and run.


HR Tech Addiction is Greater than its Productivity Enhancement

HR Tech Addiction is Greater than its Productivity Enhancement

Why is it that tools to improve our work performance are being spewed out by vendors at an ever faster rate, yet productivity and engagement seem steadfastly immune to their charms?