Information Governance

4 Basic eDiscovery Search Habits to Break

  1) Improper deduping practices When working with data filters within your eDiscovery search strategy, make sure that you only deduplicate your results AFTER running your keyword search. Failure to do this risks inadvertently excluding and missing items that fit your date range but were deduped against earlier copies of the same items outside of…

Read More

Government Investigations in E-Discovery

One of the biggest fears an organization faces is a government issued subpoena. This is NOT the point at which you should begin data collection as it is both costly and time consuming, because unlike traditional litigation there is no negotiation in the scope of discovery and prevention. At this point you have to consult…

Read More

eDiscovery and the Internet of Things (IoT)

Technology is connecting our lives like never before due to countless Wi-Fi enabled gadgets and thousands of mobile applications. The Internet of Things (IoT) is the ever-increasing network of devices that have their own IP address; think about your phone, smartwatch, GPS, tablets, Google Glass etc. Devices that were once standalone such as the thermostat,…

Read More

Considering eDiscovery Options? Understanding Time, Risk, and Cost

Balancing time, risk, and cost in the conduct of electronic discovery continues to be one of the greatest challenges faced by legal professionals today. Technology advances, laws which further define electronically stored information (ESI), and current economic conditions all serve to increase both the importance and complexity of meeting this challenge of “balance”.   With…

Read More

Primer on Data Encryption Part One: (Categorizing the Data)

Data encryption is no longer a luxury add on for law firms ; it’s a requirement. Yet without an effective plan in place, encryption will be incomplete and vulnerable to risk. Encryption methods and practices vary will vary based on the location of your data but we will highlight three location categories for your data: Know…

Read More

Basic Principles to Establish an Information Governance Policy

Information Governance programs are a growing and critical component of how organizations manage their data and records. Understanding information governance and the information lifecycle is important because data impacts all areas of an organization, including regulatory compliance, litigation, continuous improvement processes, IT infrastructure, and business strategies, to name a few. Additionally, an effective information governance…

Read More

Cell Phone Encryption: A Look at the Pros and Cons

  The topic of cell phone encryption is more common and talked about than ever before. Many individuals and companies alike are spending time thinking about whether or not it is a good idea to encrypt cell phones. Do the pros of encryption outweigh the potential cons, or vice versa? Sure, the information is protected…

Read More

Insider Threats Still a Top Cyber Risk for Corporations

The common conception with cyber risk is that nearly all attacks come from cybercriminals and ransomware. However, Kroll’s Global Fraud & Risk Report found out that most of the time is a companies current and former employees who are behind most of the cyber security incidents. With the increasing in amount of attacks and damage…

Read More

Everything You Need To Know About The Arkfeld Conference 2016

One of the most important digital conferences in Arizona will be starting shortly. The ASU-Arkfeld eDiscovery and Digital Evidence Conference will take place in the Armstrong Hall on March 9-11, 2016, making it the fifth to date The three exciting days at ASU campus in Tempe will include stimulating information about the newest issues affecting…

Read More