Information Governance

Mobile Device Encryption: A Brief Look at the Pros and Cons

The topic of mobile device encryption is more talked about than ever before. Many individuals and companies alike are spending time thinking about whether or not it is a good idea to encrypt mobile devices. But what about the risk that exists when an employee refuses to hand over the encryption password to their employer regarding a company cell phone?

Read More

Basic Principles to Establish an Information Governance Policy

Information Governance programs are a growing and critical component of how organizations manage their data and records. Understanding information governance and the information life cycle is important because data impacts all areas of an organization, including: regulatory compliance, litigation, continuous improvement processes, IT infrastructure, and business strategies, to name a few.

Read More

4 Basic eDiscovery Search Habits to Break

  1) Improper deduping practices When working with data filters within your eDiscovery search strategy, make sure that you only deduplicate your results AFTER running your keyword search. Failure to do this risks inadvertently excluding and missing items that fit your date range but were deduped against earlier copies of the same items outside of…

Read More

Government Investigations in E-Discovery

One of the biggest fears an organization faces is a government issued subpoena. This is NOT the point at which you should begin data collection as it is both costly and time consuming, because unlike traditional litigation there is no negotiation in the scope of discovery and prevention. At this point you have to consult…

Read More

eDiscovery and the Internet of Things (IoT)

Technology is connecting our lives like never before due to countless Wi-Fi enabled gadgets and thousands of mobile applications. The Internet of Things (IoT) is the ever-increasing network of devices that have their own IP address; think about your phone, smartwatch, GPS, tablets, Google Glass etc. Devices that were once standalone such as the thermostat,…

Read More

Considering eDiscovery Options? Understanding Time, Risk, and Cost

Balancing time, risk, and cost in the conduct of electronic discovery continues to be one of the greatest challenges faced by legal professionals today. Technology advances, laws which further define electronically stored information (ESI), and current economic conditions all serve to increase both the importance and complexity of meeting this challenge of “balance”.   With…

Read More

Primer on Data Encryption Part One: (Categorizing the Data)

Data encryption is no longer a luxury add on for law firms ; it’s a requirement. Yet without an effective plan in place, encryption will be incomplete and vulnerable to risk. Encryption methods and practices vary will vary based on the location of your data but we will highlight three location categories for your data: Know…

Read More

Basic Principles to Establish an Information Governance Policy

Information Governance programs are a growing and critical component of how organizations manage their data and records. Understanding information governance and the information lifecycle is important because data impacts all areas of an organization, including regulatory compliance, litigation, continuous improvement processes, IT infrastructure, and business strategies, to name a few. Additionally, an effective information governance…

Read More

Insider Threats Still a Top Cyber Risk for Corporations

The common conception with cyber risk is that nearly all attacks come from cybercriminals and ransomware. However, Kroll’s Global Fraud & Risk Report found out that most of the time is a companies current and former employees who are behind most of the cyber security incidents. With the increasing in amount of attacks and damage…

Read More