Long before starting formal discovery, an internal investigation should be launched so a party and their counsel can understand and assess the information ecosystem, identify sources of potentially relevant information and examine these sources via sampling. Although a litigant may not be required to produce the information found, it is crucial that pre-litigation investigation be handled appropriately to ensure it is accurate.
Thought Leadership and Industry Trends
In this article in Above the Law, Mike Quartararo, President of the Association of Certified E-Discovery Specialists (ACEDS), sits down with Chris O’Connor, Bill Belt, and Sue-Deelia Tang from CDS to discuss a hot topic in ediscovery.
While businesses have been showing increasing interest in moving to the cloud over the past few years, many companies have hesitated because of concerns about accessibility, control, security and cost. Today, however, we are seeing a sea change in corporations growing comfort level with cloud technologies.
As eDiscovery technology becomes more sophisticated, both small and large companies can feel overwhelmed with the choices and the potential cost. Small companies or law firms usually have little knowledge about which technology will help them review or produce documents most effectively within their budget constraints.
Virtually every company will need to collect and/or transfer data from one location to another at some point. While this may seem to be a routine matter, there are dangers, particularly when it comes to eDiscovery.
While many companies have moved at least some of their data to the cloud, others have been more cautious about taking these steps because they want to ensure their data stays in the U.S. Some cloud providers do not have enough locations in the U.S. to enable all data to remain in the country.
A recent blog post posed the question “Have we lost the war on eDiscovery?” There may be an eDiscovery War, but from my perspective, we are fighting on the same side.
The word “hack” is very ambiguous in the blockchain context. Hacking blockchain means “someone is trying to control more than 51% of the total computing power of the whole blockchain network.” The hacker is trying to read and reverse the transactions hidden in the blockchain network. However, the nature of blockchain makes this type of hacking difficult.
Data breaches reported in the media seem to be almost a daily occurrence leaving companies with both immediate and long-term damage that must be addressed.
Often discussions about data only focus on one aspect of it at a time, such as privacy, cybersecurity, retention, big data, etc. However, in order to truly protect data, organizations need to take a broader perspective. Data is an asset that has real value to every organization and its value tracks its many uses. In other words, its value varies with each user and purpose for which the data is used, and this must be considered in developing a management plan for enterprise data.
The blockchain concept can be applied to many types of transactions which has major implications for creating, storing and managing data.