The Ponemon Institute’s 2016 [Data Protection Benchmark] study pegs the average cost of a data breach at $4 million, with per-record costs rising slightly to $158 each.
Litigation readiness and classification readiness are closely related. If you standardize your content into high definition text searchable PDFs, you eliminate issues around dark data. By digitally preparing content in this manner you reduce the ‘garbage-in-garbage- out’ scenario that most RIM programs suffer from and, as many of our customers have found, you’re better able to automatically categorize your data or support other downstream processes. Once data is classified, you’re ready for litigation, not to mention all the other benefits having an organized content management system offers. You will know where data relevant to a matter is and you will be able to easily collect that data.
The biggest challenge we continue to see in organizations is their unstructured data. Unstructured data is problematic for multiple reasons, but one reason alone is enough, and that is wasted time and money in collecting irrelevant data for litigation purposes.
Following a report by The Wall Street Journal that the security vendor Tanium used a hospital’s live network as a demonstration platform on sales calls and even revealed private hospital data in a publicly posted demonstration video, Tanium CEO Orion Hindawi has admitted that mistakes were made in handling data from El Camino Hospital’s network.
Published in April 2017 by ACG Partners, this new research presentation by Trevor Martin, Ben Howe, Jon Guido, and Fred Joseph provides a detailed overview of the legal technology landscape through the lens of leaders, opportunities, and investments.
2017 MarketScape assessment from IDC on where the eDiscovery services market is going, how major eDiscovery service providers compare to each other, and what criteria are considered most important for companies to consider when evaluating and selecting a vendor.
Today, if you fail to advise clients to preserve relevant and unique mobile data when under a preservation duty, you’re committing malpractice.
The USAFacts database is perhaps the first nonpartisan effort to create a fully integrated look at revenue and spending across federal, state and local governments.
Many of the GDPR’s main concepts and principles are much the same as those in the current Data Protection Act (DPA), so if you are complying properly with the current law then most of your approach to compliance will remain valid under the GDPR and can be the starting point to build from. However, there are new elements and significant enhancements, so you will have to do some things for the first time and some things differently. It is important to use this checklist and other Information Commissioner’s Office (ICO) resources to work out the main differences between the current law and the GDPR.
Court Excludes Evidence Developed Through Plaintiff’s Surreptitious Contact with Corporate Defendant’s Employees
This case helps clearly delineate proper contact from improper gamesmanship or sharp litigation practices.
Proposed Chinese regulations (open in Google Chrome for English translation) could substantially limit the ability of companies in China from sending data outside of that country. If implemented, the regulations would potentially affect almost any type of business or data flow.
The eDiscovery Business Confidence Survey is a non-scientific quarterly survey designed to provide insight into the business confidence level of individuals working in the eDiscovery ecosystem.
Employees using private VPNs and Tor on an enterprise network are typically trying to hide their actions and do something that will not be detected by the organization’s security controls, he says. “Security bypass is the first step towards data theft or other destructive behavior,” Koo says.
Today [Wednesday, April 12, 2017], U.S. Secretary of Commerce Wilbur Ross announced that the newly launched Swiss-U.S. Privacy Shield Framework is now accepting self-certifications. The Framework provides companies a mechanism to comply with Swiss data protection requirements when transferring personal data from Switzerland to the United States in support of transatlantic commerce.
A survey by Osterman Research finds many corporations are unable to retain, produce and search through much of their internal data given depending on its age, type and where it’s stored.
Electronic discovery is the most substantive change to the practice of law in more than 100 years, yet many relegate it to the backseat by equating it simply with data and deeming it a litigation support issue.
In Liguria Foods, Inc. v. Griffith Laboratories, Inc., Judge Mark Bennett of the United States District Court for the Northern District of Iowa required both plaintiff and defense counsel to show cause why they should not be sanctioned for discovery abuses based on the excessive use of “boilerplate” objections to discovery requests.
“It’s [PowerPoint-style presentation] dangerous because it can create the illusion of understanding and the illusion of control,” General McMaster said in a telephone interview afterward. “Some problems in the world are not bullet-izable.”
There are at least two schools of thought that are very different about what constitutes the meaning of what is and what is not structured data. One school of thought, as stated previously, is that everything not in a standard DBMS is unstructured. Another definition is that something is unstructured only if there is not a rational way to explain the structure.
As you will see, the theme throughout the show (LegalTech 2017), was the use of AI within the legal industry. The overwhelming conference preoccupation with AI meant that there was a bit of a disconnect between the makeup of the exhibition, and the keynotes, briefing sessions, conversations and side events going on during the three days.
Overall, work is up — 67 percent of the Fortune 500 reported an uptick in Corporate eDiscovery work, 77 percent of survey respondents hope to increase their usage of AI and advanced analytics over the next 12 months, and two-thirds see their eDiscovery work increasing over the next 6 months.
When can an organization self-certify to the Swiss-U.S. Privacy Shield? Starting April 12, 2017, organizations can self-certify to the Swiss – U.S. Privacy Shield Framework.
Phishing can unlock a considerable amount of resources to a hacker. Businesses must have a complete and automated view of everything in their system, or they could be gutted before they’ve had time to think.
The inaugural annual review into the operation of the EU-US Privacy Shield is to take place in September this year. EU justice commissioner Věra Jourová confirmed the timing of the review in a speech in Washington late last week.
There is no natural way to place colors in order, and that makes comparing color palettes difficult. One algorithm looks set to change that.