Rachel Teisch

Rachel Teisch

Xerox Litigation Services

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Taking a Forward-Looking Approach to Enterprise Risk Management

Traditionally, organizations have taken a backward-looking approach to risk, evaluating potential hazards on a siloed, departmental basis after a loss of assets. Organizations often take few proactive steps to detect risks,...more

12/23/2014 - Risk Assessment Risk Management Third-Party Risk

A Game-Changer for E-Discovery in Hong Kong

For parties engaged in cross-border investigations or disputes in Asia, as of September 1, 2014, civil litigants in Hong Kong must follow new rules that govern the discovery of electronically stored information (ESI) set...more

12/18/2014 - Cross-Border Discovery Electronically Stored Information Hong Kong Popular

Don’t Be the Next Data Breach Target

As the much-publicized data breaches of the last year reveal, third parties are often the gateway to an organization’s data. As repositories of vast amounts of confidential client data in e-discovery, such as personally...more

12/15/2014 - Cybersecurity Data Breach Data Protection Personally Identifiable Information Popular Trade Secrets

How Well Do You Know Your Ethical Responsibilities Surrounding the Use of Technology-Assisted Review?

Lawyers who fail to comprehend the ethical challenges surrounding the use of technology-assisted review (TAR) may unknowingly damage their clients’ cases and risk sanctions for the spoliation of evidence. Therefore, it is...more

11/13/2014 - Legal Ethics Spoilation Technology-Assisted Review

The Fastest Document Reviewer in the World

Every four years, the Summer Olympic Games crowns the winners of the 100-meter dash and dubs them the fastest man and woman in the world. Currently, the world record for the men’s event is 9.58 seconds, while the women’s...more

10/31/2014 - Attorney-Client Privilege Document Productions Document Review Federal Rules of Evidence

The Home Depot Data Breach: There’s No Time Like the Present for Cybersecurity

As Home Depot’s recent cybersecurity breach emphasizes, there is no time like the present to institute controls designed to prevent an attack. In the latest data security breach, Home Depot’s servers were broken into,...more

9/23/2014 - Best Management Practices Cybersecurity Data Breach Home Depot Internal Controls Popular Risk Assessment Risk Management

The Uber Playbook: 5 Best Practices for Protecting Data Privacy

The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more

8/28/2014 - Compliance Data Collection Data Protection Personally Identifiable Information Popular Uber

Information Governance: On-the-Ground Perspectives and Practical Guidance

“Information Governance is: The activities and technologies that organizations employ to maximize the value of their information while minimizing associated risks and costs.” – Information Governance Initiative Annual Report ...more

8/28/2014 - Best Management Practices Corporate Governance Information Management Risk Assessment Risk Management Technology

How Far Does the In-House Zone of Silence Extend?

In a recent case, a Massachusetts appellate court raised important questions about the scope of the work product doctrine for in-house lawyers. In Cahaly v. Benistar Property Exchange Trust Co., the plaintiffs sought...more

8/22/2014 - Corporate Counsel Legal Ethics Work-Product Doctrine

An Emboldened FTC: What Does It Mean for a Company’s Cybersecurity Team?

In April, Edith Ramirez, Chairwoman of the FTC, and Julie Brill, FTC Commissioner, tweeted: “Pleased the court recognized @FTC’s authority to hold biz accountable for safeguarding consumer data & look forward to trying this...more

7/30/2014 - Cybersecurity Data Protection FTC FTC v Wyndham FTCA Wyndham

10 Characteristics of an Ideal Managed Services Provider

In our last post, we considered internal factors that organizations should evaluate when deciding whether and how to allocate responsibility for e-discovery between in-house and external resources. However, as they choose the...more

7/10/2014 - Litigation Fees & Costs Third-Party Service Provider

Fitting a Solution to Meet the Needs of a Workflow In-House

Your law firm just purchased a license for e-discovery software. Now what? Software implementations can be a substantial challenge for a variety of reasons, including lack of executive buy-in, poorly defined requirements,...more

7/8/2014 - Best Management Practices Law Practice Management Software

Matching the Solution to the Needs, not the Needs to the Solution

With the e-discovery services market in the U.S. exploding–estimated to exceed $3 billion by 2018–with double digit revenue growth of approximately 15% based on Gartner’s 2014 Magic Quadrant for E-Discovery Software, many...more

7/3/2014 - Marketing Outsourcing Software

Achieve Organizational Goals by Taking a Managed Services Approach to E-Discovery

With data volumes skyrocketing and the costs of litigation following a similar trajectory, organizations are exploring alternative models for managing e-discovery aside from the traditional model of outsourcing parts (or all)...more

6/26/2014 - Discovery EDRM Litigation Fees & Costs

Thorny Issues to Consider Before Buying Into BYOD

A salesperson and her boss are attending a conference at a hotel. Their goals are twofold: learning the latest industry trends and mingling with clients to generate business. After the sessions end, they invite two potential...more

5/22/2014 - Bad Faith Bring Your Own Device Destruction of Evidence Discovery Employee Rights Mobile Devices Privacy Policy Sanctions Sexual Harassment Text Messages

15 Results
|
View per page
Page: of 1