From ComplexDiscovery This week’s newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals. The newsletter also contains an informative weekly cartoon and clip as well as additional stories (Lagniappe) that may be of interest to individuals seeking to extend their capability […]
Proportionality in discovery cuts both ways; so, considering how hard they are to win and the customary modesty of recoverable damages, there’s a limit to how much time and money one can invest in working up slip-and-fall cases.
Despite the unwillingness to disclose breach information, more and more law firms are apparently purchasing or considering the purchase of cyber liability insurance to protect against potential data breaches.
The GDRP, if it becomes law, would impact any company that gathers, processes or stores data from individuals in the European Union—that is, virtually every company that does business in the EU.
The National Institute of Science and Technology released a new publication this week targeting supply chain risk management (SCRM) in IT procurements. The publication – Supply Chain Risk Management Practices for Federal Information Systems and Organizations – is not meant to replace current federal regulations but rather to outline a set of general guidelines that can be tailored to an agency’s processes.
Negation is a powerful new tool used to identify high-value words or graphical elements in documents, detect patterns across document types, and add a new dimension to Boolean logic.
Daily we read, see and hear more and more about the benefits and challenges of “the cloud.” This week our cartoon and clip features one benefit of the cloud (cartoon) and a link to a recent report on Cloud Adoption and Risk Report (clip).
47% of marketing departments will have 60% or more of their applications on a cloud platform in two years. Database (57%), e-mail (54%) and business applications (ERP, CRM & industry-specific apps) (49%) are the three leading application hosting investments enterprises will be making in the next two years.
Though each merit their own post, I’ve lumped two short topics together. The first concerns a modest e-discovery headache, being the cost, friction and static posed by GIF logos in e-mail. The second is a much uglier vulnerability hoppin’ down the bunny trail toward you right now; but rejoice, because you may still have time to avert disaster.
By Tim Klinger The expanding reach of the Freedom of Information Act has introduced a new dynamic at federal agencies, and it is driving the need for IT professionals in the public sector to understand and conduct electronic discovery for records being requested by individuals and private parties under FOIA. According to the Justice Department, more […]
The seventh installment of our quarterly Cloud Adoption and Risk (CAR) Report presents a hard data-based analysis of enterprise cloud usage. With cloud usage data from over 17 million enterprise employees spanning all major verticals, this report is the industry’s most comprehensive and authoritative source of information on how employees are using cloud services.
Technology Assisted Review (“TAR”) and visual classification take two different approaches to classifying documents. TAR uses the text associated with the documents being classified while visual classification bases its analysis on graphical representations of those documents.
Daily we read, see and hear more and more about the privacy, security and economic challenges stemming from the growing number of enterprise cybersecurity events. This week our cartoon and clip features one approach to minimizing the impact of these events (cartoon) and five quick reference links to recent and relevant mentions of cybersecurity (clip).
Documents in file shares, content management systems, and scanned archives are often described as “unstructured.” However, there is typically a high level of structure in and interconnectedness among those documents. This structure and interconnectedness occurs because specific document types contain recurring attributes or data elements and those attributes or data elements are shared with other document types.
“The value of personal financial and health records is two or three times [the value of financial information alone], because there’s so many more opportunities for fraud,” said David Dimond, chief technology officer of EMC Healthcare, a Massachusetts-based technology provider. Combine a Social Security number, birth date and some health history, and a thief can open credit accounts plus bill insurers or the government for fictitious medical care.
Regularly we read, see and hear incredibly serious presentations and pontifications related to the theory, practice and business of electronic discovery. This week our cartoon and clip features a quick look at Rule 26(f) conference planning for a frivolous lawsuit (cartoon) and a quick reference link to a very serious retrospective listing of 26 eDiscovery-related cartoons (clip).
The NetDiligence 2014 Cyber Claims Study relies on data voluntarily provided by insurers about amounts paid out on cyber claims occurring from 2011 through 2013. Since the Study only accounts cyber claims reported to larger insurers, NetDiligence believes its study only accounts for 5-10% of the total number of all cyber claims handled in those years.
There is a growing number of government and industry regulations and standards designed to help protect the confidentiality of data that companies have in their care. The need for guidance in this area is obvious, as 2014 saw a record number of software vulnerabilities and actual data breaches. Unfortunately, many of the companies that experienced those breaches are now facing lawsuits filed by individuals, investors and other entities that claim they were harmed by the exposure of their information.
Regularly we read, see and hear more and more about mergers, acquisitions, investments and investors in the business of electronic discovery. This week our cartoon and clip features an abstract look at investing in eDiscovery (cartoon) and two quick reference links that highlight merger, acquisition and investment activities from both an activity level and an investor level (clip).
One of the most challenging aspects to identifying and protecting PII is how to deal with “unstructured” content, i.e., with documents or files on file shares, personal computing devices, and content management systems. These files can be generated within and outside the organization using many applications, can be converted to multiple file formats (most commonly to PDF), and seemingly have unlimited form and content.
83% of organizations are prioritizing structured data initiatives as critical or high priority in 2015, and 36% planning to increase their budgets for data-driven initiatives in 2015.
Secretary Clinton will likely do unintentionally for the duty to preserve electronic records in controversy what Edward Snowden did intentionally for the very right to privacy from government surveillance that Secretary Clinton now claims: She may put it on the map—into the global, public tag cloud—in a big way.
Daily we read, see and hear more and more about the challenge and cost of managing email. This week our cartoon and clip features a metric highlighting one cost of email (cartoon) and four quick reference links to recent mentions of the potential impact of organizational email practices (clip).
Daily we read, see and hear more and more about the challenge of information security for private and public sector organizations. This week’s cartoon and clip features one of the reasons information security is so important to organizational leaders (cartoon) and a quick reference link to one of the most current and comprehensive resources for actionable security-related intelligence for businesses and governments (clip).