chronology

Partnering for Success: The Role of the Partnership in Legal Tech

Partnering for Success: The Role of the Partnership in Legal Tech

For legal technology companies working with law firms, success seems to be less a matter of having the very best, most efficient product on the market, and more a matter of establishing networks and relationships with law firm leaders and consultants.


Five Great Reads on Information Governance and eDiscovery: Importance of Vacations Edition

Five Great Reads on Information Governance and eDiscovery: Importance of Vacations Edition

This edition of the newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


The Business Reasons to Take a Vacation – Journal of Accountancy

The Business Reasons to Take a Vacation - Journal of Accountancy

What some organizations are starting to understand is this: Taking time off is better for business in the long run. Here are six business reasons employees—from the C-suite to the assembly line, from managing partner to entry-level accountant—should take regular vacations.


Predictive Coding and the Stop Decision

Predictive Coding and the Stop Decision

The stop decision is the most difficult decision in predictive coding. The decision must be made in all types of predictive coding methods, not just our Predictive Coding 4.0.


Relevant Replay: Zach Abramowitz Speaks with Brad Jenkins of CloudNine

Relevant Replay: Zach Abramowitz Speaks with Brad Jenkins of CloudNine

[CloudNine’s] unique approach that balances cloud benefits such as flexibility and scalability with data security and customer control is highly attractive given the importance of data security for our customers.


Strategy Matters: Aligning Innovation Strategy with Business Strategy

Strategy Matters: Aligning Innovation Strategy with Business Strategy

Companies should not be investing in a random collection of unrelated projects. There has to be some connection between our innovation strategy and the company’s overall business strategy.


Data Loss Threatens M&A Deals

Data Loss Threatens M&A Deals

More than half of all enterprise data now lives on endpoints, beyond traditional visibility and security tools centered on a network drive or central server. If the target company can’t see what its employees are doing with data on their laptops and desktops, then a potential buyer has near zero visibility.


An Educational Update: E-Discovery and Litigation Technology Certificate (UC San Diego)

An Educational Update: E-Discovery and Litigation Technology Certificate (UC San Diego)

UC San Diego Extension’s e-Discovery and Litigation Technology certificate is an online, interactive program designed to help legal professionals meet the evolving technical demands in the legal field.


A Little Privacy is Better Than None: Considering Private and Public Cloud Computing

A Little Privacy is Better Than None: Considering Private and Public Cloud Computing

Extracts from two informational papers highlighting key differences between private and public cloud infrastructures and why those differences may be important for the security of critical data and applications.


The New Information Governance Playbook for Addressing Digital Age Threats

The New Information Governance Playbook for Addressing Digital Age Threats

Published in the Richmond Journal of Law & Technology, The New Information Governance Playbook for Addressing Digital Age Threats by Philip Favro, Donald Billings, David Horrigan, and Adam Kuhn provides actionable information for assessing and addressing cyber threats.


Confirming Recall Adequacy With Unbiased Multi-Stage Acceptance Testing

Confirming Recall Adequacy With Unbiased Multi-Stage Acceptance Testing

This paper by Bill Dimm of Hot Neuron proposes a multi-stage acceptance testing procedure that avoids bias and actually works in practice. The amount of document review required with the new method depends on the level of recall actually achieved.


Deeper Dive: Vendor Management Crucial for Data Protection

Deeper Dive: Vendor Management Crucial for Data Protection

Organizational obligations regarding data privacy and security extend not only to the data in a company’s possession, but also to its data in the possession of a third-party service provider or business partner.


The Negative Consequences of ‘Da SIlva Moore’

The Negative Consequences of ‘Da SIlva Moore’

Predictive coding methods have come a long way since Judge Peck first approved predictive coding in our Da Silva Moore case. This failure to move on past the Predictive Coding 1.0 methods of Da Silva Moore, is, I suspect, one of the major reasons that predictive coding has never really caught on. In fact, the most successful document review software developers since 2012 have ignored predictive coding altogether.


Calling an End to Culling: Predictive Coding and the New Federal Rules of Civil Procedure

Calling an End to Culling: Predictive Coding and the New Federal Rules of Civil Procedure

Published in the Richmond Journal of Law & Technology, the paper Calling an End to Culling: Predictive Coding and the New Federal Rules of Civil Procedure by Stephanie Serhan provides cogent considerations and conclusions as to the of use predictive coding and the timing of that use in relation to keyword culling.


E-Discovery Giants Feud Over Trade Secrets in SDNY

E-Discovery Giants Feud Over Trade Secrets in SDNY

DTI Global, which provides e-Discovery services such as document review, is accusing its rival, LDiscovery, of dangling a total of $24 million in potential bonus payments to entice four of its top salesman to leave and join their company, and to allegedly bring major clients with them.


Relevant Replay: Does The Emperor Have Any Clothes On? Thoughts On The EDRM (2008)

Relevant Replay: Does The Emperor Have Any Clothes On? Thoughts On The EDRM (2008)

Given the ongoing focus of industry professionals on certifications, standards, and acceptance of new technologies and approaches to eDiscovery, this original article may be instructive regarding some of the general areas of challenge for any new legal technology.


A Tale of Two Codes: Model Codes of Conduct for Consideration by Legal Technology Companies

A Tale of Two Codes: Model Codes of Conduct for Consideration by Legal Technology Companies

Extract and examples of Model Codes of Conduct (MCoC) from two legal technology and eDiscovery-centric industry associations, the LTPI and the EDRM.


Disco Dancing? DISCO Launches AI Platform for Legal Technology

Disco Dancing? DISCO Launches AI Platform for Legal Technology

A next generation, deep learning platform, DISCO AI applies the latest advancements in both machine learning and cloud computing to solve the complex data analysis challenges presented in the practice of law.


Definitional Starting Points: Word2vec and Convolutional Neural Network

Definitional Starting Points: Word2vec and Convolutional Neural Network

Based on recent legal technology announcements highlighting two important but sparingly used terms (Word2vec and Convolutional Neural Network), the following “starting points” are provided for a definitional overview of these terms along with additional links for context and reference.


What Is Auto-Classification and How Does It Assist with GDPR Compliance?

What Is Auto-Classification and How Does It Assist with GDPR Compliance?

Auto-Classification’s ability to group information by category or by specific characteristics will prove useful for GDPR compliance. Similarly, Auto-Classification’s ability to detect the presence of PII and other sensitive content will likely become a best practice when it comes establishing GDPR protections.


On-Demand Legal Education: What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017

On-Demand Legal Education: What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017

You’ve heard the horror stories. Data breaches are happening within organizations at an alarming rate, and sensitive data is being compromised regularly. As an attorney, what can you do to protect yourself, your firm and your client from becoming a victim? And, what do you need to do to keep up with ever-changing requirements for data security, both within the US and internationally? This webcast will discuss what you need to know today about cybersecurity and data privacy to protect the sensitive data that your organization manages every day.


What Makes a Legal Tech Company Exciting to a Venture Capitalist?

What Makes a Legal Tech Company Exciting to a Venture Capitalist?

What’s super-interesting about the legal field is that it is very technology-centric in what it needs, and the problems are very complicated. In fact, the whole business of software is being reinvented right now by cloud computing.


Cybersecurity a Pain Point for Plaintiffs

Cybersecurity a Pain Point for Plaintiffs

Enhanced cybersecurity is a rising tide that floats all boats. But, let me reveal who’s likely to get swamped by this rising tide: requesting parties (or, as corporations call them “plaintiffs’ lawyers”), and their experts and litigation support providers.


Horses, Apples, and Oranges: Two Interesting Posts on eDiscovery Software Positioning

Horses, Apples, and Oranges: Two Interesting Posts on eDiscovery Software Positioning

Many offerings have the attributes necessary to win the eDiscovery vendor leadership race. And of those, the fourth generation offerings (designed for eDiscovery, for integration, and for automation) appear to have the best odds for success.