Posts Tagged ‘security’

2017 Year-End E-Discovery Update (Gibson Dunn)

2017 Year-End E-Discovery Update (Gibson Dunn)

The consolidation among medium-sized and large e-discovery service providers, usually financed by private equity funding, that has been going on for several years now only seemed to accelerate more in 2017. It is not apparent whether this consolidation is fundamentally altering the market for e-discovery services, other than to possibly result in greater stability in the space once all of the M&A dust settles.


Too Many Law Firms Are Still Fighting the Last War: “2018 Report on the State of the Legal Market”

Too Many Law Firms Are Still Fighting the Last War: “2018 Report on the State of the Legal Market”

Law firms have spent much of the past decade fortifying themselves against anticipated challenges. But strategies based on how the market has behaved in the past may be leaving many firms unprepared for the rapid transformations that are sweeping the legal industry.


Data Maps and Data Inventories

Data Maps and Data Inventories

Although the questions that a data map tries to solve are relatively straightforward, the process of conducting a data map can be daunting for many organizations.


The Paradox of Cloud Data: It Saves Money, But Can Be Costly, Too

The Paradox of Cloud Data: It Saves Money, But Can Be Costly, Too

Think of the irony. Not too long ago, the cloud was seen as a risky place to store and manage enterprise data. Now, with cloud increasingly seen as the safest place to move data, too much data may be getting moved offsite.


Norton Rose Fulbright 2017 Litigation Trends Annual Survey

Norton Rose Fulbright 2017 Litigation Trends Annual Survey

On average, a legal department spends 30 percent of its budget in-house; however, spending on disputes as a proportion of the organization’s revenue is least when its internal spend is between 41 percent and 60 percent of overall budget.


Estonia, the Digital Republic

Estonia, the Digital Republic

E-Estonia is the most ambitious project in technological statecraft today, for it includes all members of the government, and alters citizens’ daily lives. The normal services that government is involved with—legislation, voting, education, justice, health care, banking, taxes, policing, and so on—have been digitally linked across one platform, wiring up the nation.


Businesses Must Limit Data To Manage Litigation Costs Better

Businesses Must Limit Data To Manage Litigation Costs Better

Managing eDiscovery in the age of distributed data, mobile devices, and explosive data growth is complicated. But companies can take steps to minimise their data, cutting costs and making litigation more efficient.


The Boundary Layer Between Law and Technology in the Connected Society

The Boundary Layer Between Law and Technology in the Connected Society

There’s an interesting dynamic when a new technology emerges. As human beings, our instinct is to get excited about the technology, to think about how it can make our lives better and more interesting. What we think much less about are the implications of this new technology. How might it change our lives in ways that we don’t necessarily consider desirable? What controls are necessary in order to prevent those harms from happening?


Play the New e-Discovery “Hive Mind” Game: Small, Medium or Large?

Play the New e-Discovery “Hive Mind” Game: Small, Medium or Large?

What should you do to prepare for federal court 26(f) conferences in small and medium sized cases, versus large, complicated cases? This new eDiscovery game might help.


Do You Have “Security Fatigue”?

Do You Have “Security Fatigue”?

Defined by the National Institute of Standards and Technology (NIST), security fatigue is a weariness or reluctance to deal with computer security, leading to feelings of resignation and loss of control.


Data Security: Thinking About Bugs

Data Security: Thinking About Bugs

Security bugs may have wildly disparate paths of extermination. Some are quietly patched with code updates, while others make the national news and trigger companies’ incident response plans.


The Great ESI Sales Exodus

The Great ESI Sales Exodus

In order to understand how to transition successfully, or why a cybersecurity provider might want to hire an ESI sales representative, it is essential to understand why there is an ESI sales exodus, who stands to gain from this trend and what the cyber sales landscape looks like currently in comparison to the world of e-discovery.


Relativity Unveils Next Evolution of Their e-Discovery Platform at 8th Annual Relativity Fest

Relativity Unveils Next Evolution of Their e-Discovery Platform at 8th Annual Relativity Fest

Relativity announced key enhancements to their eDiscovery platform at their annual user conference, building on nearly 500 new features delivered this year.


Eight C’s of E-Discovery in the Cloud

Eight C’s of E-Discovery in the Cloud

The adoption of cloud applications is growing across enterprises worldwide. According to Gartner, by 2020 more than 30 percent of the 100 largest enterprise applications will have shifted from cloud-first to cloud-only – encouraging any enterprise fence-sitters to move in the direction of the cloud. 


Blockchain Could Help Us Reclaim Control of Our Personal Data

Blockchain Could Help Us Reclaim Control of Our Personal Data

The problem with a central database like the ones used to house social security numbers, or credit reports, is that once it’s compromised, a thief has the ability to copy all of the information stored there.


Cloud Computing Crash Course: Location, Location, Location

Cloud Computing Crash Course: Location, Location, Location

Don’t let the term “cloud” fool you into thinking that the information is not in a specific location. It is, and it’s important to know the exact geographic location of the server where your data will be stored, including any back-up locations.


Five Lessons All Companies Can Learn From The Equifax Data Breach

Five Lessons All Companies Can Learn From The Equifax Data Breach

While many companies may be relieved not to be in Equifax’s position right now, no company is immune to data breaches. Those who fail to learn key lessons from Equifax’s mistakes may find themselves in the next headline. Accordingly, companies in every industry, and of every size, that maintain any type of sensitive personal data—whether it be of customers, employees, or data maintained on behalf of others—should study the Equifax situation and ensure that they are better prepared for a data breach incident.


Vendor Breaches and Their Implications for Employers

Vendor Breaches and Their Implications for Employers

Before entrusting the vendor with personal information, the employer should execute a contract with the vendor that addresses the parties’ obligations and rights regarding personally identifiable information.


File Share Platforms and Business Risk

File Share Platforms and Business Risk

The risk associated with the use of file share platforms is twofold.  First, company supported file share is attractive to attackers because it is guaranteed to contain sensitive information.  Second, file share platforms available to employees outside of the company — e.g. the employee Google Drive account — may be used to store company information, but likely do not use the same security standards as those enforced by the company.


Emerging Content Formats Challenge eDiscovery

Emerging Content Formats Challenge eDiscovery

According to a recent report from Osterman Research, any electronic information is potentially subject to e-discovery, including text messages, social media posts, data in collaboration tools and data from the Internet of Things (IoT). Web pages and data from wearable devices and vehicle event recorders are among the new sources of electronically stored content (ESI) that are possible targets for e-discovery.


Counsel On Call Acquires DSicovery, LLC

Counsel On Call Acquires DSicovery, LLC

Counsel On Call, a leading alternative legal solutions provider of technology-enabled managed legal and secondment services, has acquired DSicovery, LLC (“DSi”), a renowned eDiscovery, digital forensics and data management company.


Eyeing Expansion, Chicago eDiscovery Company Rebrands

Eyeing Expansion, Chicago eDiscovery Company Rebrands

Andrew Sieja, kCura founder and CEO, said the Relativity brand long ago eclipsed kCura, a term which was coined years ago when the company had ambitions to specialize in knowledge management. Instead, it found success in the roughly $2.5 billion e-discovery software market, with a reported 13,000 users including nearly every AmLaw 200 firm, the U.S. Justice Department, plus corporations including NBCUniversal, LinkedIn, Allstate and others.


Your Riskiest Data Is Often Hiding in Plain Sight

Your Riskiest Data Is Often Hiding in Plain Sight

Organizations must consider data across all information systems and gateways, whether unstructured or structured. Don’t focus only on “building walls” around the perimeter to keep people out and keep information in. The challenge with this approach is that as you build a 10-foot wall, your opponent brings an 11-foot ladder. By the time disaster strikes, you may not be able to adequately assess or understand your corporate risk.


5 Experts Share Advice on Preparing for GDPR

5 Experts Share Advice on Preparing for GDPR

The General Data Protection Regulation (GDPR) is a great example of change taking place in one part of the world — the European Union — that will have global impact.