We help customers find fresh thinking on information intelligence. Browse our blog, case studies, webcasts, and more.
August 11th, 2016
In this employment discrimination case against the City of New York, the parties asked the court to resolve a number of discovery disputes, including a disagreement about the methodology that should be used to find responsive documents. The City preferred to use keyword searches, and the parties had engaged in some preliminary discussions about the appropriate keywords. Read about Judge Peck's order on technology assisted review.
July 11th, 2016
Back in March we reported on Pyrrho Investments Ltd. v. MWB Property Ltd., the first order by a British court approving the use of the use of technology assisted review (TAR) for litigation disclosures. In that case, Master Matthews drew heavily from Magistrate Judge Peck’s landmark decision in Da Silva Moore v. Publicis Groupe, and crafted a list of ten factors weighing in favor of the use of TAR. The court found no factors suggesting TAR should not be used. Now, another UK court has approved the use of TAR, but this time in a different posture.
June 16th, 2016
What’s next for e-Discovery in the United States and beyond? Earlier this week at Legaltech West Coast, we assembled three panels of experts—including some of the country’s most well-respected federal magistrate judges—to explore answers to that question. The discussions were lively, thought-provoking, and sometimes funny (even we can’t take e-Discovery too seriously).
June 10th, 2016
Read our discussion and education for eDiscovery practitioners focused on the context of statistical testing and measurement of techniques used to find documents containing relevant information for discovery—a context in which these statistics are fairly well-settled and easily understood.
June 6th, 2016
Today’s corporate information systems are awash with highly sensitive data. Whether it’s personally identifiable information (“PII”), personal health information (“PHI”), financial and payment information, intellectual property and trade secrets, source code—the list goes on—sensitive information exists in virtually every collection of data. Learn to protect this sensitive data from discovery.