Here are a few e-Discovery groups on the LinkedIn that are full of information from experts in the field of e-Discovery. Check them out and read along, and join the conversion.Read More
Education is a core part of eDiscovery. The discovery process is full of nuances, ranging from the different technology used to the workflows and methodologies implemented. It’s important for legal professionals to maintain a level of familiarity with these specific workflows relating to the various stages of discovery. However, taking your knowledge in eDiscovery to…Read More
The document review phase during a case can seem like a near impossible task. What looks like an endless pit of data is made even more complex through the mass amounts of words, phrases, characters and other searchable content that could in turn be possible evidence.
Although it may seem complicated, once understood it becomes easier to gain a grasp and control over your dataRead More
True ESI defensibility starts with maintaining the authenticity and privacy of the data from the moment it is collected all the way to hosting and later deletion. Data encryption provides the backbone for this security through concealing the data in a cipher, thus making it unreadable to anyone without the key.Read More
Officially referred to as House Bill 969, the bill which is more commonly known as Florida’s consumer data privacy bill marks an important shift in overall consumer data collection governance in the US.Read More
Following California’s implementation of the California Consumer Privacy Act (CCPA) which took effect on January 1st, 2020. The state is setting up the California Privacy Rights Act (CPRA) which is slated for January 1st, 2023.
The CRPA is an expansion beyond the CCPA, and will supersede it once the CRPA is fully effective. The key differences between California Privacy Rights Act (CPRA) & the California Consumer Privacy Act (CCPA) is the addition of the data minimization clause.Read More
In line with a continued effort to help widespread adoption of the National Institute of Standards and Technology’s “Cyber Security Framework” (CSF), NIST has put out definitive cybersecurity guidance relation to positioning, navigation, and timing services (PNT).Read More
At first glance social media may not seem it, but it is a major player in eDiscovery. From Facebook to TikTok, here are the top social media sites by the numbers.
Top 10 Social Media Sites Ranked by Monthly Annual Users (MAUs)Read More
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially transfer files via a computer network. There are various types of file transfer protocols but FTP is one of the more common methods used within the legal industry. FTP is typically secured through the attachment of SSL/TLS (FTPS).Read More
Information governance, or IG, is the effective management of any and all information that an enterprise creates, stores or transmits, particularly in digital format. In 2021 this includes everything from the project on the office desktop, email that’s accessed from a personal mobile device to social media conversations and wearable technology. Having a successful IG plan in place can be a tremendous benefit to any organization. Yet, IG is more than just a workplace productivity tool; establishing and maintaining IG compliance is critical to general counsel as well, for five very important reasons.Read More