Our Blog

Thought Leadership and Industry Trends

Home 9 Insights 9 Category: Insights - Advisory Services ( Page )
Managing Pre-Litigation Investigations for the Best Results

Managing Pre-Litigation Investigations for the Best Results

Long before starting formal discovery, an internal investigation should be launched so a party and their counsel can understand and assess the information ecosystem, identify sources of potentially relevant information and examine these sources via sampling. Although a litigant may not be required to produce the information found, it is crucial that pre-litigation investigation be handled appropriately to ensure it is accurate.

read more
Corporate eDiscovery and Information Governance Teams Go to the Cloud

Corporate eDiscovery and Information Governance Teams Go to the Cloud

While businesses have been showing increasing interest in moving to the cloud over the past few years, many companies have hesitated because of concerns about accessibility, control, security and cost. Today, however, we are seeing a sea change in corporations growing comfort level with cloud technologies.

read more
eDiscovery of Mobile Data 101

eDiscovery of Mobile Data 101

Mobile data is one of the most rapidly proliferating data sources in the eDiscovery realm and is gaining more significance daily. It presents unique challenges, such as securing authorization to access devices, rapidly evolving encryption features, wildly varying content formatting, device upgrades, and other issues.

read more
Preventing Spoliation During Data Transfers

Preventing Spoliation During Data Transfers

Virtually every company will need to collect and/or transfer data from one location to another at some point. While this may seem to be a routine matter, there are dangers, particularly when it comes to eDiscovery.

read more
Is There a War on eDiscovery?

Is There a War on eDiscovery?

A recent blog post posed the question “Have we lost the war on eDiscovery?” There may be an eDiscovery War, but from my perspective, we are fighting on the same side.

read more
Can You “Hack” a Blockchain?

Can You “Hack” a Blockchain?

The word “hack” is very ambiguous in the blockchain context. Hacking blockchain means “someone is trying to control more than 51% of the total computing power of the whole blockchain network.” The hacker is trying to read and reverse the transactions hidden in the blockchain network. However, the nature of blockchain makes this type of hacking difficult.

read more
5 Things You Must Consider in Protecting Your Company Data

5 Things You Must Consider in Protecting Your Company Data

Often discussions about data only focus on one aspect of it at a time, such as privacy, cybersecurity, retention, big data, etc. However, in order to truly protect data, organizations need to take a broader perspective. Data is an asset that has real value to every organization and its value tracks its many uses. In other words, its value varies with each user and purpose for which the data is used, and this must be considered in developing a management plan for enterprise data.

read more