Posts Tagged ‘Information governance’
Considerations During the Identification Stage of the EDRM
During the Identification Stage, the goal is to create and deploy a plan to identify, preserve, authenticate, and collect relevant ESI. Through identifying and defining preferred data sources that potentially hold relevant information, outlining defensible protocols to preserve and collect both structured and unstructured data, and establishing the context that this information is being used, legal teams can create a data map to aid in defining the scope of the case.
Read MoreAmazon Echo & Smart Devices: Considerations In Litigation And eDiscovery
In recent years the information requests from Law Enforcement have been rising dramatically, with the majority of these requests either being subpoenas, search warrants, and court orders. There has been a colossal increase of over 500% from 2019 to 2020, and then in just the first 6 months of 2021 there has been nearly as many information requests as there was in total in 2020.
Read MoreRevisiting ABA’s Law Firm Guide to Cybersecurity – Why You Should Care
Published nearly a year ago, the American Bar Association’s “Law Firm Guide to Cybersecurity” is more relevant than ever. Cybersecurity and Information Governance are major pillars in the legal sector. Law firms, litigation support providers, and corporate legal departments handle extremely sensitive information making it both crucial that these organizations implement cybersecurity best practices and also stay informed in the current techniques hackers are deploying to get access to this information.
Read MoreUpcoming Innovative & Virtual eDiscovery & Legal Tech Conferences (Fall 2021)
Events and conferences can be a great resource for further developing your career, whether it be your goal is building your network, furthering your industry-specific education, or any number of other motivators. One benefit or byproduct of the shift towards more remote work across the legal industry is the increased number of online events, webinars, educational resources, and digital content being produced.
Read MoreCommon & Overlooked ESI Sources – Forensic Data Collection Checklist
In order for a forensic data investigation to be thorough and complete, forensic examiners need to have confidence that the collection didn’t miss any relevant ESI. While most ESI can be attributed to the usual suspects, natural complexities and unique case-specific challenges can often lead to data being found in more obscure areas.
Read MoreConsiderations & Sample Questions for Drafting a Custodian Questionnaire
Custodian questionnaire’s and IT team interviews are valuable tools that help set the scope for the collection and discovery to come. It’s an important part of eDiscovery and information governance to implement data mapping best practices to ensure you’re collecting the right data, and that you’re not missing any potentially relevant ESI.
Read MoreABA Cybersecurity Legal Task Force Releases Second Edition of Vendor Contracting Project: Cybersecurity Checklist
If your organization has been looking for a clear and concise resource for cybersecurity guidance, the American Bar Association’s Cybersecurity Legal Task Force has you covered. They recently released the second edition of the Vendor Contracting Project: Cybersecurity Checklist, which is tailored to solo and small firm attorneys who interact with vendors that handle sensitive and confidential information.
Read More4 New Podcast Episodes to Listen to on Your Next Commute – eDiscovery, Information Governance, & More
Looking for more eDiscovery and information governance content outside of your normal feed? Here are a handful of recent podcast episodes that are both funny, relevant and informative to provide some pleasure on your next commute, or whenever you have some time to spare.
Read MoreSecuring Data Through End To End Encryption (E2EE)
True ESI defensibility starts with maintaining the authenticity and privacy of the data from the moment it is collected all the way to hosting and later deletion. Data encryption provides the backbone for this security through concealing the data in a cipher, thus making it unreadable to anyone without the key.
Read MoreFlorida’s New Consumer Data Privacy Bill Signals for More States to Follow
Officially referred to as House Bill 969, the bill which is more commonly known as Florida’s consumer data privacy bill marks an important shift in overall consumer data collection governance in the US.
Read More