In modern litigation, corporations and law firms need a technological advantage to manage and maneuver through all types of documents, both electronically stored information (ESI) and paper-based materials. Even with state-of-the art technology, workflow, project management, documentation, and information management procedures, the success of a project is dependent on a myriad of factors.  

Read More

The EDRM (Electronic Discovery Reference Model) refers to both a conceptual framework for understanding the stages within the overall eDiscovery process, and also the EDRM organization and community behind this framework and other resources. The EDRM model consists of nine stages: information governance, identification, preservation, collection, processing, review, analysis, production, and presentation. It essentially serves as a map of the electronic discovery…

Read More

During the Identification Stage, the goal is to create and deploy a plan to identify, preserve, authenticate, and collect relevant ESI. Through identifying and defining preferred data sources that potentially hold relevant information, outlining defensible protocols to preserve and collect both structured and unstructured data, and establishing the context that this information is being used, legal teams can create a data map to aid in defining the scope of the case.

Read More

In recent years the information requests from Law Enforcement have been rising dramatically, with the majority of these requests either being subpoenas, search warrants, and court orders. There has been a colossal increase of over 500% from 2019 to 2020, and then in just the first 6 months of 2021 there has been nearly as many information requests as there was in total in 2020.

Read More

Published nearly a year ago, the American Bar Association’s “Law Firm Guide to Cybersecurity” is more relevant than ever. Cybersecurity and Information Governance are major pillars in the legal sector. Law firms, litigation support providers, and corporate legal departments handle extremely sensitive information making it both crucial that these organizations implement cybersecurity best practices and also stay informed in the current techniques hackers are deploying to get access to this information.

Read More

Events and conferences can be a great resource for further developing your career, whether it be your goal is building your network, furthering your industry-specific education, or any number of other motivators. One benefit or byproduct of the shift towards more remote work across the legal industry is the increased number of online events, webinars, educational resources, and digital content being produced.

Read More

If your organization has been looking for a clear and concise resource for cybersecurity guidance, the American Bar Association’s Cybersecurity Legal Task Force has you covered. They recently released the second edition of the Vendor Contracting Project: Cybersecurity Checklist, which is tailored to solo and small firm attorneys who interact with vendors that handle sensitive and confidential information.

Read More