Subscribe: EDD Blog Online
http://eddblogonline.blogspot.com/rss.xml
Added By: Feedage Forager Feedage Grade A rated
Language: English
Tags:
click source  click  continue reading  continue  data  discovery  information  legal  reading click  reading  source  technology 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: EDD Blog Online

edd blog online



A look into the ever evolving landscape of legal discovery to include but not limited to big data, cloud computing, data privacy, forensics, electronic discovery, information governance, social media, and proactive discovery management.



Last Build Date: Mon, 15 Jan 2018 16:33:03 +0000

 



The Dreaded eDiscovery Budget

Thu, 11 Jan 2018 13:33:00 +0000

Here are some ways to conquer the necessary evil.  It’s a new year, and with a new year come the requests for budgets. Oh, the fear. I felt you shudder all the way to my office in Colorado.A request for a budget for eDiscovery — the practice area with the most potential for change and fluctuation in the key variables for budgeting — can strike fear in the bravest among us.I’m here to tell you that with some creative thinking, metrics for your client, good assumptions, and excellent communication with your client about the basis for your budgeting, you can create an eDiscovery budget and do it very well. Remember out of the gate who your audience is and why they want the budget. In-house counsel have to get approval for dollars, and your budget is, in essence, a response to an RFP to the finance or procurement department to work against after you’ve already gotten the case. In-house counsel are held to their budgets and yours is incorporated. When yours gets blown, so does theirs, and that does not endear those relationships. Many corporate clients require budgets that are submitted to and managed by their online billing systems and any bill that exceeds a specific percentage of the budget is flagged and rejected until the firm and in-house counsel communicate about status. Some just reject the invoices outright.To Continue Reading: Click Here --------------------------------------------------- Source: above the lawBy: Kelly Twigger[...]



Five Cost Saving Measures for E-Discovery

Tue, 02 Jan 2018 13:22:00 +0000

Tired of paying more than you have to for e-discovery? These simple steps can cut your costs and can be implemented without much effort.No one wants to pay more for anything than they have to, especially e-discovery. Here are some cost saving tips to consider.1. Size Matters: The size of your data set affects three different costs. First, when processing data, vendors usually charge one price for importing data into the processing tool (the “in” charge) and another, higher price for the data exported from the tool (the “out” charge).The “in” charge usually includes de-duplication, de-NISTing, date and search term filtering and is based on the uncompressed gigabyte (“GB”) size. If you collect a pst in a zip file that is 5 GB compressed, the vendor will extract the pst from the zip file, thereby uncompressing it. This can greatly increase, even double or triple, your gigabyte size and therefore, your cost. So, it is important to consider the uncompressed size for budgeting purposes.To Continue Reading: Click Here --------------------------------------------------- Source: Legaltech news By: Anne McCray and Cristin K. Traylor[...]



The 8 Most Significant Enterprise Breaches of 2017

Thu, 21 Dec 2017 13:37:00 +0000



If 2016 proved that all sectors of the U.S. economy were subject to cyberattacks, 2017 was the year this point hit home.

The year was marked by some of the biggest enterprise breaches ever experienced in the U.S., not to mention a fair share of incidents connected to the compromise of third party vendors. What’s more, a few were made worse because of cover ups and delayed notifications.

Enterprise cybersecurity and the management of cyber risk has a long way to go in 2018. Hopefully, this year’s seemingly endless stream of breaches has provided a wake-up call for many to get into shape in the near future. Here’s a look at eight of the most significant enterprise breaches of 2017.

To Continue Reading: Click Here 
--------------------------------------------------- Source: Legaltech news By: Rhys Dipshan



In Race to GDPR Compliance, US Outpacing EU Counterparts

Tue, 14 Nov 2017 20:24:00 +0000

With enforcement of the EU’s General Data Protection Regulation (GDPR) just around the corner, preparations have begun in earnest. But according to the “Getting to GDPR Compliance: Risk Evaluation and Strategies for Mitigation” report by International Association of Privacy Professionals (IAPP), such preparations are happening in vastly different ways on either side of the Atlantic.Surprisingly, the survey found that more US organizations, 84 percent, expect to be fully GDPR compliant when the regulation takes effect in May 2018, than EU organizations, 72 percent. In addition, U.S. organizations are planning to be GDPR compliant earlier than their EU counterparts, as over one-third (36 percent) said they would be compliant by the end of March 2018, compared with 24 percent of EU organizations that said the same.The report surveyed almost 500 in-house privacy professionals, around 90 percent of whom equally hailed from either EU organizations or US organizations.When asked why EU organizations lagged behind, Rita Heimes, research director at IAPP, noted that “it probably has to do with not having the right staffing and right budget to get up to speed in time.”To Continue Reading: Click Here --------------------------------------------------- Source: Legaltech news By: Rhys Dipshan[...]



Sedona Conference Releases Finalized Third Edition of the Sedona Principles

Tue, 03 Oct 2017 16:22:00 +0000

The often-cited e-discovery guidelines were ‘put through the ringer,’ and the result is updated principles and expanded commentary for a new technological age.Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. Not only were they used heavily in prominent e-discovery rulings (Principle 6 in 2015’s landmark Rio Tinto PLC v. Vale S.A. decision, for example), but often, opposing parties look to them when finding consensus during the discovery and meet-and-confer process.But there’s one issue: the Principles had not seen a full-scale rewrite since 2007, when the second edition was released, during the same month as the original iPhone. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business.The wait, though, has come to a close. Following a four-plus year development process and a comment period earlier this year, the Sedona Conference announced today the release of the third edition of its Sedona Principles, found on the organization's website. The new edition changes some principles themselves—notably Principles 2, 3, 8 and 14—while also seeing wholesale updates to commentary in areas such as Principle 6.To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: Zach Warren[...]



Deloitte Hack Reveals Email Vulnerabilities and Regulatory Gaps

Tue, 26 Sep 2017 18:17:00 +0000

Big Four” professional services firm Deloitte yesterday disclosed that hackers had successfully breached the organization’s email system last fall and may have had access to its emails up until the breach was discovered in March of this year.Deloitte did not respond to requests for comment, but confirmed the cyberattack to reporters forThe Guardian and Gizmodo. In statements provided to each of these publications, Deloitte said that “very few” clients had been “impacted,” though it did not disclose the depth of said impacts, and that each client had been notified. Deloitte additionally noted that it had contacted both government authorities and regulators and had retained law firm Hogan Lovells to review the incident.Jon Neiditz, partner at Kilpatrick Townsend & Stockton and co-leader of Kilpatrick’s cybersecurity, privacy and data governance practice, noted that Deloitte’s admission that hackers had specifically breached its email system reflects a breach of its “crown jewels,” or its most valuable asset.To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: Gabrielle Orum[...]



3 Issues Arising Out of the EU-US Privacy Shield Annual Review

Mon, 25 Sep 2017 14:40:00 +0000

From concerns over U.S. surveillance to how the agreement will address GDPR provisions, there are several potential challenges facing the EU-US cross-border transfer framework.While the Privacy Shield was approved in July 2016 and certification began the following month, the EU-US cross border data transfer framework, which has been used by more than 2,400 organizations since its inception, has since been panned by many EU officials and agencies.The EU’s Article 29 Working Party, for example, still has concerns over the agreement that it believes were not properly addressed in last year’s negotiations.But on Monday, September 18, EU officials got the chance address their criticisms with U.S. officials at the two-day Annual Joint Review on the Privacy Shield in Washington D.C.While an official report documenting what was discussed and agreed to at the conference may be still weeks away, experts weighed on what issues were most likely discussed during the review:To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: Rhys Dipshan[...]



The Crucial Role Of The Project Manager In eDiscovery

Wed, 13 Sep 2017 11:58:00 +0000

Dealing with eDiscovery is complex, and the details to be handled are endless. 


Dealing with electronically stored information (“ESI”) is complex. The details to be handled are endless, and the skill set needed to do it effectively is highly technical.

Those of you who deal with ESI are nodding your heads, and those of you who let someone else do it truly do not understand the complexity that is involved. That’s ok, but you need to learn so you can have the right people doing the right jobs. And you need to learn to appreciate the expertise that they bring to the table.

By way of example, remember the last time you tried to search for an email you knew was in your inbox but you couldn’t find it, no matter how many searches you tried?  The systems that we use to create, send, store and manage ESI were never designed to pull data for purposes of litigation. That means that to engage in ediscovery effectively, you need people who think about how data functions, where it lives, and the complexities of the various forms of data.

To Continue Reading: Click Here
--------------------------------------------------- 
Source: ABOVE THE LAW
By: Kelly Twigger



Why Your Best Information Governance Metric is Value

Fri, 08 Sep 2017 12:21:00 +0000


Knowledge workers in your organization don’t want to do records management and information governance. For the most part, they just want to do their jobs without daily impediments.

That's why information governance professionals must start small and demonstrate the value of their governance programs for end users.

Those were some of the messages Box executives and information governance officials drove home in a two-part webinar series with CMSWire.

Value, Not Risk, Drives Information Governance


“Focus on the value of information,” Chris Walker, principal at PHIGs Information Management Consulting, said on the webinar, “Tackle the Big 3 of Information Governance: Use digital transformation to power retention, discovery and classification."

To Continue Reading: Click Here
--------------------------------------------------- 
Source: CMSWire
By: Dom Nicastro



Trade Secrets Confidentiality During E-discovery an Increasing Focus for Attorneys

Thu, 07 Sep 2017 17:04:00 +0000

The Defend Trade Secrets Act and the 2015 FRCP amendments have attorneys reevaluating how they look at and defend trade secrets.It has been a year since a new federal law was enacted that further helps to protect trade secrets. Still, there are continuing concerns about the need to keep trade secrets private during e-discovery.The Defend Trade Secrets Act (DTSA) of 2016 provides two new protections to owners of trade secrets: A court may require affirmative actions to protect a trade secret, and in criminal proceedings, the court may not authorize or direct the disclosure of any information the owner says is a trade secret unless the court allows the owner the opportunity to file a submission under seal that describes the interest of the owner in keeping the information confidential. The DTSA has been applied in many ways, particularly as a source for litigation in the tech industry.But many counsel are seeking to extend those protections to e-discovery. To further encourage secrecy, David Stanton, an attorney at Pillsbury Winthrop Shaw Pittman, told Legaltech News that for the most sensitive data, “we are advising clients to consider hosting it themselves, and allowing it to be inspected rather than producing and losing control to a third party.”He pointed out that during e-discovery, increasingly the standard protective order “[takes] on more rigorous requirements, including notifications of any type of cyber intrusion or unauthorized access, and detailed requirements on what kind of systems will be used, with what sorts of security protections, to host trade-secret data.”To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: Ed Silverstein[...]



An E-Discovery Lesson: The Giant Fail of the ‘Email Jail’

Tue, 05 Sep 2017 15:57:00 +0000

A New Mexico federal case reveals that even under the new FRCP rules, custodian self-collection and ‘email jails’ can lead to e-discovery sanctions.Once upon a time, not so long ago, there was a Federal Rule of Civil Procedure providing a safe harbor, prohibiting sanctions for the “reasonable, good-faith operation of an electronic information system.”That all changed on December 1, 2015.In the 2015 e-discovery amendments to the Federal Rules, the good-faith operation of an electronic information system language was deleted in favor of a new “intent to deprive” standard.Critics have argued the intent to deprive standard is too high a barrier for litigants seeking sanctions for bad behavior in e-discovery. However, as August’s New Mexico federal court decision in N.M. Oncology & Hematology Consultants v. Presbyterian Healthcare Servs. illustrates, you can still get sanctions under the new rules for what may be the good-faith operation your information system.The moral of the story here is that custodian self-collection and information systems with “email jails” are really bad ideas.To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: David Horrigan[...]



Top 5 Tools for Your E-Discovery Survival Kit

Tue, 15 Aug 2017 14:41:00 +0000

As data volumes and varieties grow, analytics and machine-learning e-discovery technologies can help cut through the clutter.Surviving in today's e-discovery landscape has become increasingly challenging. The burden of growing data varieties and volumes is impossible to avoid, and pressure to contain e-discovery budgets is at an all-time high.As corporate data volumes grow, they become more expensive and complex to manage . And just as legal professionals begin to get their arms around the latest data source, new ones emerge, making it difficult to stay apace.So how do legal teams equip themselves in this climate? Below are the five most important tools legal teams need for their e-discovery survival kits. These capabilities ensure that as matters become more complex, teams can work smarter, not harder.1. Visual Analytics: In art and life, we appreciate that a picture says 1,000 words. This is also true in e-discovery with visual analytics, which can help teams quickly understand key facts, uncover document themes and build a strong case strategy, even before review begins.To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: Jeff Braislin[...]



Lawyer's 'Inadvertent' E-Discovery Failures Led to Wells Fargo Data Breach

Fri, 28 Jul 2017 17:49:00 +0000

A massive Wells Fargo customer data breach was not the work of a hacker, but of the bank's own lawyer who failed to review the bank's entire set of discovery documents, including information about the bank's wealthy customers, before it was shipped to a litigation adversary.The event highlights the increasing risks of relying on unfamiliar e-discovery technology—and the potential liability exposure to lawyers."Unbeknownst to me, the view I was using to conduct the review has a set limit of documents that it showed at one time," said Wells Fargo's attorney, Angela Turiano, a New York-based principal at Bressler, Amery & Ross, in an affidavit. "I thought I was reviewing a complete set, when in fact, I only reviewed the first thousand documents."Turiano's affirmation explains in detail how she inadvertently provided Wells Fargo customer information, including personally identifiable information about wealthy customers and their assets, in discovery.To Continue Reading: Click Here--------------------------------------------------- Source: New York Law JournalBy: Christine Simmons[...]



Why Metrics Are The Key To Managing Costs In Discovery

Wed, 26 Jul 2017 12:45:00 +0000

Data drives decisions in business. It’s that simple. And the same is true in the discovery of ESI. When a client has multiple matters over any period of time, there are basic metrics that can be captured that will help the client to budget, make decisions about resolving a matter, make a case for proportionality, or make larger decisions about information governance. There are, of course, always facts about a matter that will skew metrics in a certain way – the bulk of the data was large image files vs. email, the matter was a broad-reaching government investigation, etc. – and those need to be taken into account when reading the metrics and relying on them. If you want to effectively manage your litigation portfolio, if you are a firm that is spending money on tools to handle data for your clients, or if you are a provider trying to provide the best cost and best in class service to your clients, you should pay attention to metrics.To Continue Reading: Click Here--------------------------------------------------- Source: ABOVE THE LAWBy: Kelly TwiggerPo[...]



Texts Generate New E-Discovery Dilemmas for In-House Counsel

Tue, 25 Jul 2017 12:25:00 +0000

As executives and employees increasingly rely on text messages for business-related communications and courts continue to admonish or even issue sanctions for failure to preserve texts, companies have to figure out how to handle and manage employee text messages.For in-house counsel, this form of communication creates a number of considerations when it comes to e-discovery policies and litigation holds, including sensitivity to employee privacy and now applications that encrypt and sometimes even delete messages. A 2015 survey of 254 adults in the U.S. found that 80 percent use texting for business and 15 percent indicated that more than half of their text messages were related to business. Meanwhile, courts, acknowledging that "texting has become the preferred means of communication," have in recent years imposed sanctions when text messages are not properly preserved.To Continue Reading: Click Here--------------------------------------------------- Source: Inside CounselBy: Jennifer Williams-Alvarez[...]



Employees represent the ‘biggest data security risk’

Fri, 21 Jul 2017 12:32:00 +0000

Employees might be the most valuable asset to an organisation, but they also represent the biggest security risk


IT professionals believe that compliance and regulation, and the unpredictable behaviour of employees will have the biggest impact on data security according to a new Concensus survey commissioned by independent global data security specialist, HANDD Business Solutions (HANDD).

The findings are launched alongside HANDD’s new advisory paper, which tackles the issue of data protection and provides organisations with an insight into the challenges and solutions associated with securing data on its journey through the enterprise.

The survey of 304 IT professionals in the UK shows that 21% of respondents say regulations, legislation and compliance will be one of the two greatest business challenges to impact data security.

To Continue Reading: Click Here
--------------------------------------------------- 
Source: information age
By: Nick Ismail



How AI and machine learning can help solve IT's data management problem

Wed, 12 Jul 2017 16:14:00 +0000

Getting a handle on huge amounts of data is a challenge for IT departments. Here's how AI and machine learning can help sort, organize, and aggregate huge stores of information.According to Samsung, global internet traffic surpassed one zettabyte — or one billion terabytes — in 2016. That number is huge, but it doesn't begin to approach the total data that companies are storing.Even more concerning is the possibility that, at most companies, data "under management" is a misnomer.Key areas of data management challenge are:Understanding dark dataData retentionData integration for best analytics resultsData accessIT departments struggle in these areas for the following reasons:The flow of incoming data of all types, much of it unstructured, is too great to manage on a daily basis, so they just end up putting the data anywhere.To Continue Reading: Click Here--------------------------------------------------- Source: TechRepublicBy: Mary Shacklett[...]



Winning? US Is Top in Corporate Data Breach Costs Thanks to Legal

Wed, 21 Jun 2017 12:11:00 +0000

An IBM and Ponemon Institute study found indirect costs such as litigation make the United States the most expensive country for corporations to suffer a data breach.Implementing cybersecurity controls can be expensive and frustrating for companies, but dealing with the fallout from a breach is inevitably far more costly. And nowhere is that more evident than in U.S. corporations, which hold the distinction of having the highest data breach financial liabilities worldwide, according to the 2017 Cost of Data Breach Study.The study was sponsored by IBM and conducted by the Ponemon Institute, which surveyed 419 corporations across 17 industries in 14 countries, including 63 corporations in the United States. On a per capita basis, U.S. corporations paid $225 per each lost or stolen record, up from the previous record of $221 in 2016, and far outpacing Canada, which held the second highest cost at $190 per record.The average total cost of a breach in the United States reached $7.35 million per organization, up from $7 million in 2016 and topping the previous record of $7.24 million in 2011. The Middle East (which the study defined as the United Arab Empires and Saudi Arabia) had the second highest costs at $4.94 million per organization in 2017, followed by Canada at $4.31 million.To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: Rhys Dipshan[...]



Overcoming the E-discovery Shot Clock Challenge

Tue, 20 Jun 2017 14:28:00 +0000

By marrying people and technology, mid-sized firms can go to the hoop more often, with more success, even with a shortened time to litigation.The FRCP Amendments. Yes, another article referencing the 2015 Amendments, but with a different spin on the ball this time. The primary intent of the amendments is to enable the discovery process to be faster, more focused, reduced in scope, thereby less expensive—ultimately allowing cases to be decided on the merits (Rule 1).These amendments had their origins in the realization that increasing amounts of data being created and stored was often skewing the legal process. Discovery costs were becoming central to whether litigants would be denied the right to have their cases decided on the merits.Accompanying this mandate is the game-changing realization that we are now in a new era of massive data creation in multiple complex formats. Litigators now need people, expertise and technology that can collect, process, cull and search this information much earlier in the case timeline.To Continue Reading: Click Here--------------------------------------------------- Source: Legaltech newsBy: Howard Reissner[...]



Using Information Governance Strategies to Prepare for the GDPR

Thu, 15 Jun 2017 12:23:00 +0000

The General Data Protection Regulation (GDPR) goes into effect in roughly one year, yet many multi-national companies are still behind in preparing for compliance. This sweeping regulation requires organizations to meet stringent data protection requirements over personal data of EU citizens and for the first time, also impacts companies that are based outside of Europe. GDPR defines personal data as any information related to an individual, which can include things like physical address, email address, IP addresses, age, gender, GPS location, health information, search queries, items purchased, etc.Many companies today freely harvest and commercialize this information. GDPR preparedness involves cross-departmental work involving privacy, security, legal, IT, compliance, outside counsel and other stakeholders. With just a year remaining to put compliance programs in place, corporations need actionable and efficient strategies to effectively prepare.Feedback from in-house counsel and information governance (IG) professionals around GDPR readiness and urgency has been mixed. In some cases, GDPR has been rated low on the list of concerns that are expected to impact the legal department in the next one to three years. Conversely, respondents in a recent advice from counsel study indicated that GDPR is top of mind for corporations with European operations, customers or partners. The reality of the penalties and litigation risks that may result from noncompliance are serious, and the amount of time corporations have left to prepare is hardly enough for the scope of work that will need to be completed.To Continue Reading: Click Here --------------------------------------------------- Source: Corporate CounselBy: Sonia Cheng[...]



Adopt or Perish? Attorneys and Vendors Battle Over AI Adoption

Wed, 14 Jun 2017 19:17:00 +0000

A fiery discussion between technologists and lawyers reflects a need for further educationThe vendor floor at Legaltech conferences has historically been an e-discovery bonanza, but a new hot topic clearly emerged on Legalweek West's vendor floor this week—artificial intelligence (AI). AI tools are moving into the mainstream of the legal technology field, prompting both excitement and concern in the legal community. One of Legalweek West's most highly trafficked panels, "AI and Automation: Game Changers for the Legal Marketplace," featured a lively and heated discussion between panelists and audience members about the potential and current role of automation and artificial intelligence in legal organizations. Vendors pushed attorneys to get over their reticence toward innovation in the field, while attorneys pushed back, asking vendors to address their concerns and help them better understand how to implement AI into their work. Andrew Arruda, CEO of ROSS Intelligence; Apoorv Agarwal, CEO of Text IQ; Pallab Chakraborty, senior counsel for Tesla; and moderator Emily Foges, CEO of Luminance, spoke to about 60 audience members about the ways in which they've tried to apply machine learning to various legal problems, and the frustrations they've experienced in convincing attorneys to adopt. Foges asked the audience if anyone in the audience was using AI in their workflow—only one hand went up. "I had to see it to actually believe it," the audience member said. "The results really spoke for themselves."To Continue Reading: Click Here --------------------------------------------------- Source: Legaltech newsBy: Gabrielle Orum HernándezPosted 1 wee[...]



Three Corporate Legal Ops Paths, One Goal: Tackling E-Discovery Spend

Wed, 07 Jun 2017 11:47:00 +0000

At the ACC Legal Operations conference, legal operation managers at Bank of America, Groupon, and Abbott explained how they reigned in their e-discovery budgets.As ever more information becomes digitized, and new data sources like social media enter the equation, legal departments face ballooning e-discovery costs. While some companies have mitigated these rising expenditures by bringing e-discovery in-house, they still are faced with further reigning in this spend to meet stagnating or shrinking budgets.In an effort to aid others, legal operations professionals from three large U.S.-based organizations spoke at the “Five Ways to Better Control Discovery Spend” session at the Association of Corporate Counsel’s (ACC) Legal Operations Conference and divulged how they met this challenge head on. While many used similar strategies, the way they executed these plans was unique and spoke to their own situations and preferences.Here is a look at the strategies and processes they used:Bank of AmericaFor Judith Beall, associate general counsel & senior vice president at Bank of America (BOA), limiting e-discovery costs means having full control of each legal matter, from the beginning to the end of a case.“What we do in BOA, when we have a matter open in our case matter system, whether it’s litigation employment, regulatory, or an internal investigation, is that we have someone on my team assigned to that matter at the very beginning. They are there from the very beginning before discovery even starts,” she explained. “So when we get to the point where we do legal holds or start collections or need to negotiate with the other side… we already have someone in place who knows the process, who has been working with our internal counsel and outside counsel figuring out what we’re going to do.”To Continue Reading: Click Here --------------------------------------------------- Source: Legaltech newsBy: Rhys Dipshan[...]



LTPI Reveals Adaptable Model Code of Conduct for Legal Technology Companies

Wed, 31 May 2017 13:49:00 +0000

The document, written from the perspective of a legal technology company, aims to establish ethical standards and guidelines for the legal technology community.Every legal technology company puts forth its own contractual obligations and legal terms and agreements. But missing from many of those agreements are ethical and behavioral obligations.The Legal Technology Professionals Institute (LTPI) is trying to change that. LTPI has released the first edition of the LTPI Model Code of Conduct (MCoC), a document intended to establish ethical standards and guidelines for the legal technology community. The 21-page document breaks the ethical guidelines down into eight sections separated by relevancy to various sectors of the legal technology community.The document is written from the perspective of a technology company rather than from a third party so that the code can be easily adopted and posted to a company’s website as its own. In exchange, LTPI asks to be credited on the company’s site, as well as for the company to redline any changes that a company makes to the model code. The document is free to download and adopt.To Continue Reading: Click Here --------------------------------------------------- Source: Legaltech newsBy: Zach Warren[...]



E-Discovery Automated: New Technology is Changing the Top Tools for Law Firms

Fri, 26 May 2017 14:00:00 +0000

E-discovery ushered in the era of legal technology. Now, newer technologies, and those using them, stand to change the tools and how they’re leveraged. From the bar to the bench, e-discovery is now ingrained in the psyche of legal technology itself, be it legislation or software redefining the way lawyers obtain information. And while the first wave of e-discovery evolution was driven by changes in how we create information, the next step is being made by advances in both technology and the increasing difficulty of handling massive data sets.One of the most impactful technological advancements on e-discovery is also one changing the world beyond legal technology: automation. Whether you call it artificial intelligence, machine learning, or in the case of e-discovery, technology assisted review (TAR), automation is expected to shake up the legal industry itself in the near future. As technology theorist and author Richard Susskind told Legaltech News, technologies “are enabling machines to take on many of the tasks that many used to think required human lawyers, and that's not plateauing. It seems to be happening at quite a rate."Now, the technology needed to automate components of the discovery process is readily available and in use at many of the major law firms in the United States. And using that technology may soon not optional—given the size of clients’ data sets, firms may have to look toward automation for discovery.  But for now, how are law firms meeting the demand of their clients, and what benefits can be gained from their experience?To Continue Reading: Click Here  --------------------------------------------------- Source: Legaltech newsBy: Ian Lopez[...]



The Best Cybersecurity Investment You Can Make Is Better Training

Tue, 16 May 2017 16:26:00 +0000

As the scale and complexity of the cyber threat landscape is revealed, so too is the general lack of cybersecurity readiness in organizations, even those that spend hundreds of millions of dollars on state-of-the-art technology. Investors who have flooded the cybersecurity market in search for the next software “unicorn” have yet to realize that when it comes to a risk as complex as this one, there is no panacea — certainly not one that depends on technology alone.Spending millions on security technology can certainly make an executive feel safe. But the major sources of cyber threats aren’t technological. They’re found in the human brain, in the form of curiosity, ignorance, apathy, and hubris. These human forms of malware can be present in any organization and are every bit as dangerous as threats delivered through malicious code. With any cyber threat, the first and last line of defense is prepared leaders and employees, whether they are inside an organization or part of an interconnected supply chain.To Continue Reading: Click Here  --------------------------------------------------- Source: Harvard Business ReviewBy: Dante Disparte[...]