Webinar: Beyond the Four Corners: Evolving Electronic Documents The definition and boundaries of “document” are changing, as new source and file types proliferate and custodian behavior changes. New challenges like modern attachments,
Webinar: Off-Channel Communications: Strategies and Best Practices
Webinar: Off-Channel Communications: Strategies and Best Practices Never have there been so many communication devices, apps, and services available for use by employees, and employees helping themselves to these options can create
Webinar: Hold On: Get a Grip on Conducting Effective Legal Holds
Webinar: Hold On: Get a Grip on Conducting Effective Legal Holds In a world of new and evolving sources, conducting effective legal holds is more critical than ever. Done properly, legal holds
Webinar: What’s Next in Cybersecurity: Understanding Post-COVID Cyber Threats and Proactive Steps to Mitigate Them
Webinar: What's Next in Cybersecurity: Understanding Post-COVID Cyber Threats and Proactive Steps to Mitigate Them The COVID-19 pandemic has created a host of new cybersecurity and data privacy threats for organizations. Malicious
Webinar: Disputes, Compliance, and Conduct Management
Webinar: Disputes, Compliance, and Conduct Management A number of regulators have recently issued statements which indicate that they will look more favourably on organisations who have pro-active and effective compliance regimes in
Discovery Challenges in Cross-Border Litigation and Investigations
Discovery Challenges in Cross-Border Litigation and Investigations By Drew Macaulay, Managing Director The need for multinational corporations to gather and review documents from different jurisdictions for investigation and litigation purposes is not
Case Study: Custom Engineering Enables Redaction of Documents for High-Profile IP Dispute
Custom Engineering Enables Redaction of Documents for High-Profile IP Dispute A large collection of documents needed redaction for a discovery deadline. Custom scripting of the redaction tools were developed, utilized, and allowed us
How to Prepare for the CCPA: Know Your Data
How to Prepare for the CCPA: Know Your Data Maureen O'Neill, Esq. In a highly globalized market where big data proliferation has run unchecked, organizations are increasingly vulnerable to mismanagement of their
Webinar: GDPR CCPA and US Federal Privacy Regulations
Webinar: GDPR CCPA and US Federal Privacy Regulations This webinar will explore where we have been, where we are now and what the future hold for GDPR, CCPA and U.S. Federal Privacy
Eye on Discovery – Can You Trust Your Law Firms With Your Data?
Eye on Discovery -Can You Trust Your Law Firms With Your Data? Your data is only as safe as the data of your least secure link to it. Unfortunately, for many organizations, suppliers that
Eye on Discovery – Is Office 365 Enough to Meet Your eDiscovery Needs?
Eye on Discovery - Is Office 365 Enough to Meet Your eDiscovery Needs? To claim that Office 365 is a success would be an understatement. With a 320 percent increase in enterprise users from
Eye on Discovery – Five Steps to Take Now to Prepare for the General Data Protection Regulation
Eye on Discovery - Five Steps to Take Now to Prepare for the General Data Protection Regulation Once the European Court of Justice issued its decision in Schrems v. Data Protection Commissioner, businesses began
Eye on Discovery – The EU-US Data Privacy Framework: Is It Our Destiny or the Dark Side?
The EU-US Data Privacy Framework: Is It Our Destiny or the Dark Side? “Oh, I’m afraid the deflector shield will be quite operational when your friends arrive.” With these words, the Emperor taunted Luke Skywalker,
Eye on Discovery – 11.5 Million Reasons for Law Firms to Take Data Security Seriously
Eye on Discovery - 11.5 Million Reasons for Law Firms to Take Data Security Seriously In early April, we bore witness to what may be the largest data breach in history: 11.5 million confidential
Eye On Discovery: The Eight Commandments of Data Preservation
Eye On Discovery: The Eight Commandments of Data Preservation Since the addition of the e-discovery amendments to the Federal Rules of Civil Procedure in 2006, sanctions for spoliation have risen markedly. This trend seems
The Snowden Effect – How the Landscape of Cross-Border Discovery is Impacted by Recent Events
Webinar: The Snowden Effect - How the Landscape of Cross-Border Discovery is Impacted by Recent Events Presented as part of the ALM Virtual Corporate Counsel Forum, this one-hour webinar, will examine how
Decoding Encrypted Documents in Cross-Border eDiscovery
Decoding Encrypted Documents in Cross-Border eDiscovery Successfully managing encrypted data depends on the processes and technology used. With the right know-how and technology, it is possible to properly collect and decrypt data and
Digital guardians: Protecting companies against IP theft by John Shaw
Digital guardians: Protecting companies against IP theft by John Shaw May 2012 As technology becomes more sophisticated and the tracking of intellectual property (IP) theft becomes more challenging, the pressure is on IT
How Businesses Can Protect Themselves from IP Theft by John Shaw
How Businesses Can Protect Themselves from IP Theft by John Shaw February 2012 Software companies can spend enormous amounts of money and time developing new products; yet underestimate the ease of code being