Individuals calling themselves the “CyberCaliphate” hacked into the Twitter feed for the U.S. military’s Central Command last week, and for 40 minutes posted photos, links, and videos before the account was shut down. They also gained access to Central Command’s YouTube profile, updating the banner image and posting Islamic State propaganda videos. While no confidential or top secret information was stolen, and hackers did not gain access to the U.S. Department of Defense’s network, the incident illustrates the risks government agencies face as they increasingly rely on cloud services to fulfill their mission and communicate with the outside world.
In this episode of Digital Detectives, Sharon Nelson and John Simek interview Jason Baron about information governance, dark data, open government, and his role in The Decade of Discovery. Baron talks about the increasing amount of electronic data affecting the Freedom of Information Act (FOIA) and the discussion e-discovery experts need to have about providing public access to government records.
By Gibson Dunn In our Mid-Year E-Discovery Update , we reported that 2014 was shaping up to be the “year of technology” in e-discovery. The remainder of the year more than lived up to those expectations. Powerful new data analytics tools have become available for search and review, predictive coding pricing is becoming more accessible […]
According to a recent Cloud Security Alliance survey on cloud adoption practices and trends , large companies have more mature governance practices than their smaller peers. But across the board, fewer than half of companies surveyed have implemented controls like acceptable use policies for cloud, security awareness training programs, and cloud governance committees to create policies and monitor enforcement. Today, 72% of companies don’t even know the scope of shadow IT at their companies, but the majority understand shadow IT is not going away and must be managed.
I’m going to add to the IG definition war this week, by describing information governance as:
“A holistic strategy for using and managing information to meet business objectives. Information governance assures the quality of content and data, maximizes its value, and ensures that security, privacy, and life-cycle requirements are met”.
A review some of the basic concepts and terminology used in this article may be helpful before going further. It is also important to remember that ei-Recall is a method for measuring recall, not attaining recall. There is a fundamental difference. Many of my other articles have discussed search and review methods to achieve recall, but this one does not.
Everyone should know that in legal search analysis False Negatives are documents that were falsely predicted to be irrelevant, that are in fact relevant. They are mistakes. Conversely, documents predicted irrelevant, that are in fact irrelevant, are called True Negatives. Documents predicted relevant that are in fact relevant are called True Positives. Documents predicted relevant that are in fact irrelevant are called False Positives.
A colleague buttonholed me at the American Bar Association’s recent TechShow and asked if I’d visit with a company selling concept search software to electronic discovery vendors. Concept searching allows electronic documents to be found based on the ideas they contain instead of particular words. A concept search for “exploding gas tank” should also flag documents that address fuel-fed fires, defective filler tubes and the Ford Pinto. An effective concept search engine “learns” from the data it analyzes and applies its own language intelligence, allowing it to, e.g., recognize misspelled words and explore synonymous keywords.
It has long been known that subtle electronic fields and noises emitted by computers can reveal clues about your activity, a powerful spying method that can be done from a few feet away. These so-called “side-channel signals” can be collected by antennas or microphones and through analysis could reveal sensitive data such as encryption keys.
It’s time for our annual review of eDiscovery case law! We had more than our share of sanctions granted and denied, as well as disputes over admissibility of electronically stored information (ESI), eDiscovery cost reimbursement, and production formats, even disputes regarding eDiscovery fees. So, as we did last year and the year before that and also the year before that , let’s take a look back at 2014!
A locked door is nothing to a determined intruder, and who among us is protected by more than a thin pane of glass? Our feeble efforts at security merely serve to stave off opportunistic threats of the sort that move on to easier pickings when a door is locked or the lights on. The rest is mostly luck.
2014 has been perhaps the biggest year Information Governance (“IG”) has seen. A relatively small and, if not unknown, at least undefined field only a few years ago has grown into an area of interest—and concern—to many organizations.
By Kamal Shah It’s always fun (and a bit humbling) to look back at predictions for the current year to see which were spot on and which missed the mark. In reexamining our own predictions for 2014 , several came to fruition in full effect: “The rise of SMACS,” “Enterprises regain control of encryption keys,” […]
By Greg Buckles Amazon and Microsoft cloud storage and servers have driven the Total Cost of Ownership (TCO) for online data storage down into the 10-15¢/GB/month range depending on whether you need a dedicated, encrypted appliance or other special security for your sensitive data. The bottom line is that this has eDJ Group clients challenging […]
The US Department of Commerce, Bureau of Industry and Security (BIS) recently released a redacted Advisory Opinion dated November 13, 2014 that confirms for cloud-based software vendors (or Software as a Service providers) that allowing access to export controlled software for use only in the cloud (or on servers) does not constitute an export of that software to the user.
The ILTA 2014 Law Firm Tech Survey was just released. The International Legal Technology Association each year conducts a comprehensive survey of law firm technology. At 301 pages, the report is packed with information. I summarize here findings on practice support and the business of law that I find interesting; I also offer some comments. This survey is a Herculean effort and we should all applaud ILTA and the many volunteers and participants who make it possible.
As data continues to proliferate exponentially, businesses of all kinds are finding it more and more worthwhile to analyze that data so they can better pinpoint market opportunities, deliver greater value to their customers and improve the efficiency of their operations. But businesses need a lot of help gathering, integrating, analyzing and monetizing data on an increasingly massive scale.
Kroll just released conclusions and limited data from a short eDiscovery survey covering trends such as Predictive Coding (PC/TAR) use, Social Media, BYOD, the ‘Internet of Things’ and Security. With over 550 law firm and corporate respondents, Kroll has certainly managed to get a statistically significant sampling, though they were the first to acknowledge that their questions were very basic data points.
Big data is now big business. In recent years, due to the exponential growth of databases (spurred at least in part by social media and cloud storage) and of the capability of technology to undertake data analytics on a massive scale, organisations have started to appreciate the potential hidden value that could be derived from their data.
Kroll Ontrack surveyed over 550 law firm and corporate ediscovery professionals to gauge the biggest trends and impacts in ediscovery in 2014. This was a great year for the world of ediscovery, and now is the perfect time to share some of the interesting 2014 trends with all of you.
There’s never been a phenomenon like Docker . Eighteen months ago, the company took its core technology, which enables IT people to move software easily between different machines by enclosing it in “containers”, and made it open source.
While Americans’ associations with the topic of privacy are varied, the majority of adults in a new survey by the Pew Research Center feel that their privacy is being challenged along such core dimensions as the security of their personal information and their ability to retain confidentiality.
Until a few years ago, there was basically no effort expended to measure the efficacy of eDiscovery. As computer-assisted review and other technologies became more widespread, an interest in measurement grew, in large part to convince a skeptical audience that these technologies actually worked. Now, I fear, the pendulum has swung too far in the other direction and it seems that measurement has taken over the agenda.
In a sea of 600+ e-discovery providers in the US alone, trying to find the right vendor to meet and fulfill your requirements is difficult. Like purchasing a car, you have a choice of vendors that range from local, to regional and national providers. Some that use their own technologies, others that use off-the-shelf products and a few others that provide traditional processing and hosting services spawned from the paper world.
Hadoop, Data Lakes, Predictive Analytics and the Ultimate Demise of Information Governance – Part Two
Information Governance is, or should be, all about finding the information you need, when you need it, and doing so in a cheap and efficient manner. Information needs are determined by both law and personal preferences, including business operation needs. In order to find information, you must first have it. Not only that, you must keep it until you need it. To do that, you need to preserve the information.