Lessons in Compliance from Legaltech 2017

Earlier this month at Legaltech we assembled a panel of three in-house experts to discuss preparing for and navigating through compliance issues successfully. The discussion, a step outside the normal talk of e-discovery, resulted in a session ripe with audience participation and even yielded an article on Law.com.

Sampling for Sensitive Data: Sample “Depth”

In this post, we focus on a complexity of estimating richness, precision, and recall when searching for sensitive information: sample “depth.” Sample “depth” is the level at which we intend to measure and remediate. Learn about sensitive data in your sampling.

What’s Next for E-Discovery? Legaltech West Coast Offered Some Insight.

What’s next for e-Discovery in the United States and beyond? Earlier this week at Legaltech West Coast, we assembled three panels of experts—including some of the country’s most well-respected federal magistrate judges—to explore answers to that question. The discussions were lively, thought-provoking, and sometimes funny (even we can’t take e-Discovery too seriously).

Richness and Precision and Recall (Oh My!)

Read our discussion and education for eDiscovery practitioners focused on the context of statistical testing and measurement of techniques used to find documents containing relevant information for discovery—a context in which these statistics are fairly well-settled and easily understood.

Some Things Don’t Need to be Discovered. Protect Sensitive Data in Discovery.

Today’s corporate information systems are awash with highly sensitive data. Whether it’s personally identifiable information (“PII”), personal health information (“PHI”), financial and payment information, intellectual property and trade secrets, source code—the list goes on—sensitive information exists in virtually every collection of data. Learn to protect this sensitive data from discovery.