We help customers find fresh thinking on information intelligence. Browse our blog, case studies, webcasts, and more.
What’s next for e-Discovery in the United States and beyond? Earlier this week at Legaltech West Coast, we assembled three panels of experts—including some of the country’s most well-respected federal magistrate judges—to explore answers to that question. The discussions were lively, thought-provoking, and sometimes funny (even we can’t take e-Discovery too seriously).
Read our discussion and education for eDiscovery practitioners focused on the context of statistical testing and measurement of techniques used to find documents containing relevant information for discovery—a context in which these statistics are fairly well-settled and easily understood.
Today’s corporate information systems are awash with highly sensitive data. Whether it’s personally identifiable information (“PII”), personal health information (“PHI”), financial and payment information, intellectual property and trade secrets, source code—the list goes on—sensitive information exists in virtually every collection of data. Learn to protect this sensitive data from discovery.
Last month in Poway, California, Gabriela Dow, a member of the district’s Educational Technology Advisory Committee, made a fairly routine public records request for information from the school district. She sought information related to the day-to-day operation and technology of the school district, as well as any records bearing her own name. But what Ms. Dow actually received was quite troubling.
I recommend that all lawyers stay informed about these FBI cybersecurity alerts and the cybersecurity threats that prompt them. In fact, I believe our ethical duties obligate us to take this reasonable step, which will ebable us to better protect the confidential and private information of our clients.