Some InfoSec Guidance for In-House and Outside Counsel: ACC Issues its “Model Information Protection and Security Controls”

Previously, we’ve explored the ever-increasing information security risks faced by law firms, which hold some of their clients’ most sensitive and confidential information. This week, one of the world’s largest and most respected law firms fell victim to a ransomware attack, shutting down its entire computer network system for several days. The Model Controls address thirteen areas of security measures which are designed to serve as a list of baseline security measures that corporate counsel may consider requiring its outside law firms to implement.

People, Process, and Technology: A Familiar Refrain, but Still Critically Important

One theme that emerged in many of the programs at the CLOC Corporate Legal Operations Institute is a tenet familiar to us at DiscoverReady: The importance of integrating "People, Process, and Technology" in the design and execution of a solution.

Some Things Don’t Need to be Discovered. Protect Sensitive Data in Discovery.

Today’s corporate information systems are awash with highly sensitive data. Whether it’s personally identifiable information (“PII”), personal health information (“PHI”), financial and payment information, intellectual property and trade secrets, source code—the list goes on—sensitive information exists in virtually every collection of data. Learn to protect this sensitive data from discovery.

May the Luck of the Irish be With You (and Your TAR).

Just in time for a St. Patrick’s Day eDiscovery blog post, earlier this month the High Court in Dublin issued an order approving the use of technology assisted review (TAR). In Irish Bank Resolution Corporation Ltd. v. Sean Quinn, Justice Fullam found that “technology assisted review using predictive coding discharges a party’s discovery obligations” under the applicable Supreme Court rule, Rule O.31 r.12.

Welcome to the New Year – Artificial Intelligence and Legal Discovery in 2015

As you may have noticed, over the last several weeks in the e-discovery blogosphere there’s been no shortage of posts looking back at developments in 2014 and making predictions about what’s ahead in 2015. So I resisted the temptation to make my own list. Instead, I decided to spend some time doing a deeper dive ...