chronology

Cyber-Insurance: Assess Risk, Policy & Obligations

Cyber-Insurance: Assess Risk, Policy & Obligations

The Ponemon Institute’s 2016 [Data Protection Benchmark] study pegs the average cost of a data breach at $4 million, with per-record costs rising slightly to $158 each.


Content Standardization: Why Litigation and Classification are Related

Content Standardization: Why Litigation and Classification are Related

Litigation readiness and classification readiness are closely related. If you standardize your content into high definition text searchable PDFs, you eliminate issues around dark data. By digitally preparing content in this manner you reduce the ‘garbage-in-garbage- out’ scenario that most RIM programs suffer from and, as many of our customers have found, you’re better able to automatically categorize your data or support other downstream processes. Once data is classified, you’re ready for litigation, not to mention all the other benefits having an organized content management system offers. You will know where data relevant to a matter is and you will be able to easily collect that data.

The biggest challenge we continue to see in organizations is their unstructured data. Unstructured data is problematic for multiple reasons, but one reason alone is enough, and that is wasted time and money in collecting irrelevant data for litigation purposes.


Tanium CEO Admits Using Real Hospital Data in Sales Demos

Tanium CEO Admits Using Real Hospital Data in Sales Demos

Following a report by The Wall Street Journal that the security vendor Tanium used a hospital’s live network as a demonstration platform on sales calls and even revealed private hospital data in a publicly posted demonstration video, Tanium CEO Orion Hindawi has admitted that mistakes were made in handling data from El Camino Hospital’s network.


Insights on Legal Technology from ACG Partners

Insights on Legal Technology from ACG Partners

Published in April 2017 by ACG Partners, this new research presentation by Trevor Martin, Ben Howe, Jon Guido, and Fred Joseph provides a detailed overview of the legal technology landscape through the lens of leaders, opportunities, and investments.


IDC Publishes New MarketScape on Worldwide eDiscovery Services

IDC Publishes New MarketScape on Worldwide eDiscovery Services

2017 MarketScape assessment from IDC on where the eDiscovery services market is going, how major eDiscovery service providers compare to each other, and what criteria are considered most important for companies to consider when evaluating and selecting a vendor.


A New Paradigm in Mobile Device Preservation

A New Paradigm in Mobile Device Preservation

Today, if you fail to advise clients to preserve relevant and unique mobile data when under a preservation duty, you’re committing malpractice.


Steve Ballmer Serves Up a Fascinating Data Trove

Steve Ballmer Serves Up a Fascinating Data Trove

The USAFacts database is perhaps the first nonpartisan effort to create a fully integrated look at revenue and spending across federal, state and local governments.


A 12 Step Approach to General Data Protection Regulation (GDPR) Compliance

A 12 Step Approach to General Data Protection Regulation (GDPR) Compliance

Many of the GDPR’s main concepts and principles are much the same as those in the current Data Protection Act (DPA), so if you are complying properly with the current law then most of your approach to compliance will remain valid under the GDPR and can be the starting point to build from. However, there are new elements and significant enhancements, so you will have to do some things for the first time and some things differently. It is important to use this checklist and other Information Commissioner’s Office (ICO) resources to work out the main differences between the current law and the GDPR.


Court Excludes Evidence Developed Through Plaintiff’s Surreptitious Contact with Corporate Defendant’s Employees

Court Excludes Evidence Developed Through Plaintiff’s Surreptitious Contact with Corporate Defendant’s Employees

This case helps clearly delineate proper contact from improper gamesmanship or sharp litigation practices.


Data Flows from China Could Be Significantly Restricted

Data Flows from China Could Be Significantly Restricted

Proposed Chinese regulations (open in Google Chrome for English translation) could substantially limit the ability of companies in China from sending data outside of that country. If implemented, the regulations would potentially affect almost any type of business or data flow.


A Bump or Slump from Trump? The Spring 2017 eDiscovery Business Confidence Survey

A Bump or Slump from Trump? The Spring 2017 eDiscovery Business Confidence Survey

The eDiscovery Business Confidence Survey is a non-scientific quarterly survey designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem.


95% of Organizations Have Employees Seeking to Bypass Security Controls

95% of Organizations Have Employees Seeking to Bypass Security Controls

Employees using private VPNs and Tor on an enterprise network are typically trying to hide their actions and do something that will not be detected by the organization’s security controls, he says. “Security bypass is the first step towards data theft or other destructive behavior,” Koo says.


U.S. Secretary of Commerce Announces Swiss-U.S. Privacy Shield Framework is Open for Business

U.S. Secretary of Commerce Announces Swiss-U.S. Privacy Shield Framework is Open for Business

Today [Wednesday, April 12, 2017], U.S. Secretary of Commerce Wilbur Ross announced that the newly launched Swiss-U.S. Privacy Shield Framework is now accepting self-certifications. The Framework provides companies a mechanism to comply with Swiss data protection requirements when transferring personal data from Switzerland to the United States in support of transatlantic commerce.


Challenged by the Old and New, Corporate E-Discovery Hits a Wall

Challenged by the Old and New, Corporate E-Discovery Hits a Wall

A survey by Osterman Research finds many corporations are unable to retain, produce and search through much of their internal data given depending on its age, type and where it’s stored.


Time To Change Your eDiscovery Mindset

Time To Change Your eDiscovery Mindset

Electronic discovery is the most substantive change to the practice of law in more than 100 years, yet many relegate it to the backseat by equating it simply with data and deeming it a litigation support issue.


Court Issues Warning To The Bar Regarding Use Of “Boilerplate” Discovery Objections

Court Issues Warning To The Bar Regarding Use Of “Boilerplate” Discovery Objections

In Liguria Foods, Inc. v. Griffith Laboratories, Inc., Judge Mark Bennett of the United States District Court for the Northern District of Iowa required both plaintiff and defense counsel to show cause why they should not be sanctioned for discovery abuses based on the excessive use of “boilerplate” objections to discovery requests.


Five Great Reads on Information Governance and eDiscovery: From Privacy to Peril

Five Great Reads on Information Governance and eDiscovery: From Privacy to Peril

This edition of the newsletter highlights five key posts on information governance and electronic discovery that are presented to inform and update legal and information technology professionals.


From Mattis and McMaster to Bezos: The Perils of PowerPoint

From Mattis and McMaster to Bezos: The Perils of PowerPoint

“It’s [PowerPoint-style presentation] dangerous because it can create the illusion of understanding and the illusion of control,” General McMaster said in a telephone interview afterward. “Some problems in the world are not bullet-izable.”


Untangling the Definition of Unstructured Data

Untangling the Definition of Unstructured Data

There are at least two schools of thought that are very different about what constitutes the meaning of what is and what is not structured data. One school of thought, as stated previously, is that everything not in a standard DBMS is unstructured. Another definition is that something is unstructured only if there is not a rational way to explain the structure.


LegalTech 2017: An Overview from eDisclosure Expert Andrew Haslam

LegalTech 2017: An Overview from eDisclosure Expert Andrew Haslam

As you will see, the theme throughout the show (LegalTech 2017), was the use of AI within the legal industry. The overwhelming conference preoccupation with AI meant that there was a bit of a disconnect between the makeup of the exhibition, and the keynotes, briefing sessions, conversations and side events going on during the three days.


What Are Your Clients Really Saying About eDiscovery?

What Are Your Clients Really Saying About eDiscovery?

Overall, work is up — 67 percent of the Fortune 500 reported an uptick in Corporate eDiscovery work, 77 percent of survey respondents hope to increase their usage of AI and advanced analytics over the next 12 months, and two-thirds see their eDiscovery work increasing over the next 6 months.


Swiss-U.S. Privacy Shield FAQs

Swiss-U.S. Privacy Shield FAQs

When can an organization self-certify to the Swiss-U.S. Privacy Shield? Starting April 12, 2017, organizations can self-certify to the Swiss – U.S. Privacy Shield Framework.


Phishing – Why We Keep Getting Netted

Phishing - Why We Keep Getting Netted

Phishing can unlock a considerable amount of resources to a hacker. Businesses must have a complete and automated view of everything in their system, or they could be gutted before they’ve had time to think.


First EU-US Privacy Shield Annual Review to Take Place in September 2017

First EU-US Privacy Shield Annual Review to Take Place in September 2017

The inaugural annual review into the operation of the EU-US Privacy Shield is to take place in September this year. EU justice commissioner Věra Jourová confirmed the timing of the review in a speech in Washington late last week.