search
  resources   /   news   /   events
Select Page
    How Coronavirus Increases Our Cybersecurity Risks

    How Coronavirus Increases Our Cybersecurity Risks

    The coronavirus is here and is impacting our daily routines. Organizations have responded by mandating that everyone works from home to be safe from exposure. Social distancing is the new norm. Virtually all businesses now must cope with managing a virtual workforce to some degree. That comes with new security risks for the data that businesses spend millions of dollars to protect.

    7 Early Case Assessment Features You May Not Know About

    7 Early Case Assessment Features You May Not Know About

    Early Case Assessment (ECA) enables law firms and companies to significantly reduce costs by eliminating non-relevant data while providing valuable insight into data sets early in the discovery process. While ECA tools and methods have become more mainstream in the last few years, there are still many features and benefits that are not well-known or understood.

    Why Data Destruction is Essential to Information Governance

    Why Data Destruction is Essential to Information Governance

    From GDPR to HIPAA, and ever-evolving state and federal regulations, the need for clear and effective strategies for management of seemingly endless amounts of data is at an all-time high. Organizations must focus on Information Governance not only to minimize potential liability, but to improve operations and reduce costs. 

    Leveraging e-Discovery Solutions for FOIA Requests

    Leveraging e-Discovery Solutions for FOIA Requests

    In 2018, the federal government received 863,729 FOIA requests and spent over $540 million on related costs. With these numbers rising each year, the burden on federal agencies is escalating rapidly. This same scenario plagues state and local governments as well, albeit on a different scale.

    Preparing for Your First Data Breach

    Preparing for Your First Data Breach

    Imagine you are the CIO of a large financial institution and you just discovered two unencrypted laptops stolen from your premises, which contained customers’ personal information (also known as ‘personally identifiable information’ or PII). The highly visible data breach is likely to result in bad public relations and potentially a class-action lawsuit on behalf of the individuals whose identities were stolen.

    Assessing the Gender Gap in eDiscovery

    Assessing the Gender Gap in eDiscovery

    Our Insights Thought Leadership and Industry Trends Assessing the Gender Gap in eDiscovery Everyone can agree that women have made significant inroads in every profession, but it is also clear there is still much work to be done, especially in positions traditionally...