Relationship Between Data Relevancy & Cost in eDiscovery

By Josh Markarian | September 23, 2020

How utilizing data filtering, de-duplication, reduction, and sampling reduces discovery and document review costs.

5 Initial Digital Computer Forensic Reports to Run in a Forensic Data Investigation

By Josh Markarian | September 14, 2020

At times forensic investigations are needed to take a deeper dive into forensically collected data whether it be in response to affidavits, request for expert testimony, the need to review employee activity, or a range of other investigation triggers.

New NIST Publication Offers Insights to Challenges in Cloud Computing Forensic Science

By Josh Markarian | September 3, 2020

The National Institute of Standards and Technology (NIST) has just released their free of charge publication, NIST Cloud Computing Forensic Science Challenges, that highlights the key takeaways of common forensics challenges faced by experts when responding to incidents that have occurred in a cloud-computing ecosystem.

Slack, Microsoft Teams and Channel-Based Platforms in eDiscovery Overview

By Josh Markarian | August 31, 2020

Slack, Microsoft Teams and other channel-based platforms are becoming the new normal replacing email in a capacity as the daily back and forth messaging platform. With benefits of real-time interaction and integrations from file sharing to video chatting, companies have been adopting these cloud-based platforms at scale across their enterprise.

Recent Florida Case Ruling Warns of Dangers with Self-Collection During Discovery

By Josh Markarian | August 24, 2020

Rule 26(g) Signing of Discovery Requests, Responses, and Objections is the requirement of engagement in discovery in a defensible and responsible way. The rule was created to limit abuse in discovery through the use of sanctions. Discovery is an essential part of the legal process and as a result a party should be given the opportunity to properly prepare and develop their case. Rule 26(g) is brought in when there is a range of issues originating from the handling of ESI and proper collection of data most commonly when there is evidence of spoliation, failure to produce, lack of due diligence, and in this case self-collection.

Mobile Device Encryption: A Brief Look at the Pros and Cons

By Josh Markarian | August 19, 2020

The topic of mobile device encryption is more talked about than ever before. Many individuals and companies alike are spending time thinking about whether or not it is a good idea to encrypt mobile devices. But what about the risk that exists when an employee refuses to hand over the encryption password to their employer regarding a company cell phone?

Approved Final Set of California Consumer Privacy Act (CCPA) Regulations Now in Effect

By Josh Markarian | August 14, 2020

California has approved of final regulations under the California Consumer Privacy Act (CCPA). The CCPA was initially enacted in 2018 and first took effect at the start of the new year on January 1, 2020. The new regulations were approved on August 14, 2020 and went into effect immediately.

New In-Depth Cybersecurity Report From Association of Corporate Counsel

By Josh Markarian | July 30, 2020

The Association of Corporate Counsel (ACC) has released their key findings and the full report from their 2020 STATE OF CYBERSECURITY REPORT: AN IN-HOUSE PERSPECTIVE. The study was conducted between April and May of 2020, and was composed of a target audience of ACC members in various legal department roles. The study covered an expanse…

Legal Tech Conferences Turn Digital For Upcoming Events

By Josh Markarian | July 17, 2020

While attending conferences, meetups and collaboration forward expos in person might not be in the foreseeable future, that doesn’t mean that those events won’t be happening. Many of these events have turned 100 percent digital, reinventing the experience, promising the same if not higher value.

New York State Bar Considers Mandatory Tech & Cybersecurity CLE Credit

By Josh Markarian | July 8, 2020

The New York State Bar Association (NYSBA) has recently approved a recommendation from the NYSBA committee on Technology and the Legal Profession regarding the introduction of adding an required credit in cybersecurity to mandatory continuing legal education (MCLE) requirements. This would be limited to one additional credit and be categorized under the “Ethics and Professionalism” category. It does not tack on and change minimum hour requirements for experienced or new attorneys respectively.

TERIS works with leading law firms and corporate legal departments. We provide sophisticated consultation-based solutions, state-of-the-art technologies and highly experienced project management.

Our Business Partners

relativity_logo small
Zapproved_Logo small
Nuix_company_logo small
logo_brainspace small