Long before starting formal discovery, an internal investigation should be launched so a party and their counsel can understand and assess the information ecosystem, identify sources of potentially relevant information and examine these sources via sampling. Although a litigant may not be required to produce the information found, it is crucial that pre-litigation investigation be handled appropriately to ensure it is accurate.
Our Blog
Thought Leadership and Industry Trends
Are Corporations Moving Their Data To The Cloud Or Not?
In this article in Above the Law, Mike Quartararo, President of the Association of Certified E-Discovery Specialists (ACEDS), sits down with Chris O’Connor, Bill Belt, and Sue-Deelia Tang from CDS to discuss a hot topic in ediscovery.
Corporate eDiscovery and Information Governance Teams Go to the Cloud
While businesses have been showing increasing interest in moving to the cloud over the past few years, many companies have hesitated because of concerns about accessibility, control, security and cost. Today, however, we are seeing a sea change in corporations growing comfort level with cloud technologies.
A Checklist for Selecting the Right Technology and Service Provider for eDiscovery
As eDiscovery technology becomes more sophisticated, both small and large companies can feel overwhelmed with the choices and the potential cost. Small companies or law firms usually have little knowledge about which technology will help them review or produce documents most effectively within their budget constraints.
Preventing Spoliation During Data Transfers
Virtually every company will need to collect and/or transfer data from one location to another at some point. While this may seem to be a routine matter, there are dangers, particularly when it comes to eDiscovery.
Leveraging In-Country Cloud Services for eDiscovery and Investigations
While many companies have moved at least some of their data to the cloud, others have been more cautious about taking these steps because they want to ensure their data stays in the U.S. Some cloud providers do not have enough locations in the U.S. to enable all data to remain in the country.
Is There a War on eDiscovery?
A recent blog post posed the question “Have we lost the war on eDiscovery?” There may be an eDiscovery War, but from my perspective, we are fighting on the same side.
Can You “Hack” a Blockchain?
The word “hack” is very ambiguous in the blockchain context. Hacking blockchain means “someone is trying to control more than 51% of the total computing power of the whole blockchain network.” The hacker is trying to read and reverse the transactions hidden in the blockchain network. However, the nature of blockchain makes this type of hacking difficult.
What to Do After a Data Breach? Experts Weigh in on Developing a Response Plan
Data breaches reported in the media seem to be almost a daily occurrence leaving companies with both immediate and long-term damage that must be addressed.
5 Things You Must Consider in Protecting Your Company Data
Often discussions about data only focus on one aspect of it at a time, such as privacy, cybersecurity, retention, big data, etc. However, in order to truly protect data, organizations need to take a broader perspective. Data is an asset that has real value to every organization and its value tracks its many uses. In other words, its value varies with each user and purpose for which the data is used, and this must be considered in developing a management plan for enterprise data.
Blockchain Impacts More Than Cryptocurrency: Are You Ready?
The blockchain concept can be applied to many types of transactions which has major implications for creating, storing and managing data.