Too often, organizations buy systems that have greater functionality than they really need.
Under the terms of the agreement, which has been approved by the boards of directors of both companies, a newly formed, indirect wholly-owned subsidiary of OpenText will commence a tender offer for all outstanding shares of Daegis for $0.82 per share in cash, for a total equity value of approximately $13.5 million. OpenText will fund the acquisition with cash on hand.
Companies are delving into vast amounts of data to spot previously hidden perils and manage risk better.
Not all clouds have a silver lining. Organizations, particularly large ones, are still struggling to determine how the cloud will fit into a true long-term information governance strategy.
The scope of discovery is now limited to that which is “proportional.” In other words, courts will not permit discovery into expensive ESI, without a cost-benefit analysis.
This Order provides a good example of the balancing act a Court must perform in connection with a subpoena for documents. The requesting party’s right to the information must be carefully balanced against the burdensomeness to the third party of complying with the subpoena.
75 percent of organizations think they have information governance under control and are making the most of their information assets. But only 4 percent actually are.
Litigants have been ignoring e-discovery obligations with impunity for so long they’ve come to think of it as an entitlement. Protected from predators, few have evolved.
The order to non-party Yelp in the attempted defamation suit of the jeweler against the commenter is the latest in a series of attempts by libel plaintiffs and the government to force content hosts to unmask anonymous commenters.
If lawyers and computer forensics experts have learned one thing about electronic evidence in the past decade, it is that digital evidence never really goes away.
A new survey of 316 executives from large global companies, conducted by Forbes Insights and sponsored by Teradata in partnership with McKinsey, provides a fresh look at the state of big data analytics implementations.
Failure to monitor third parties can put businesses at enormous risk — particularly for bribery and corruption — and cost businesses financially and reputationally.
The challenge for prosecutors will be to attend to individual investigations, ensure that the case is investigated and brought within the statute of limitations, and build a case that is strong against not only the company but the culpable individuals.
The DOJ said it plans to focus on prosecuting the actual individuals who commit corporate crime, no matter how senior they may be within a company, rather than focusing only on civil cases against the companies themselves.
By Nicole Miskelly With more and more organisations planning to migrate to the cloud, in a bid to update systems, save costs and gain a greater level of efficiency, concerns are being raised about the risks posed by holding sensitive data in cyber space. With comments from Sean O’Donnell, Technology Director, Sapient Global Markets and […]
Why Did the United States District Court Find Apple’s Proposed Protective Order Unduly Restrictive, Unreasonable, and Arbitrary?
Even Apple’s extremely valuable source code is not entitled to an arbitrary, unreasonable, and unduly restrictive protective order.
When an e-discovery project lands on her desk, Lisa Alleyne, senior counsel at Bell Canada, focuses first on making it smaller.
Cognitive computing involves self-learning systems that use data mining, pattern recognition and natural language processing to mimic the way the human brain works.
A claw back provision essentially will undo a document production. In theory, this is a great way to increase the flow of information between opposing parties, decrease discovery costs, and limit the amount of time spent combing through documents before they are produced. See 2006 Advisory Committee Note to Fed.R.Civ.P. 26(f). However, this only works if opposing counsel plays by the rules of the “claw back” game.
By David Roe Digital transformation projects will propel some $149.9 billion in enterprise application spending this year — and much of that money will be spent on disruptive vendors, according to new estimates from Gartner . “To fulfill digital business initiatives, organizations are increasingly turning to disruptors — specialized local providers, startups and open source […]
This case, like many others in recent months, serves as a good reminder that often the client is best served by a counsel willing to cooperate during discovery. What’s more – a cooperative counsel often retains credibility in the eyes of the Court.
E-Discovery Update: Balancing Costs with Desire to Not Produce Irrelevant and Potentially Privileged Documents
Producing large volumes of documents without reviewing them and subject to a “quick peek” or “clawback” agreement is not advisable in most cases. And, fortunately, many courts will not force this type of agreement on a producing party without a finding of prior discovery wrongdoing.
Is it only up to the lawyers to “understand the risks and benefits of technology?” Or, should the definition of judicial competence be updated to include an understanding of technology?