Information Governance

News & Analysis as of

A Framework for Discovery Automation: eDiscovery Trends

Automation has been a recurring theme this year on this blog. At the beginning of the year, I declared that the age of eDiscovery automation is upon us. I’ve also spoken about discovery automation on numerous occasions,...more

Industry Insight: Information Governance – Leverage Your Business Intelligence and Reduce Risk

“The goal is to turn data into information, and information into insight.” – Carly Fiorina, former CEO, Hewlett-Packard Co. The most valuable asset of every organization is information. Organizing, analyzing and...more

19 Tips for Fixing Troublesome Transitions Between E-Discovery Stages

In every process – from data flow to human travel – transitions are a place of difficulty. Data flowing through cables can slow or stall when it’s split through junctions and routers. If you’re traveling by air, the layover...more

You Don’t Have to Move Your Data to Manage it Effectively: Information Governance Trends

When it comes to effective records management of your organization’s data, many people think that the data has to be moved to a centralized location, such as a server or other file share, to be managed effectively. But, you...more

Privacy and Cybersecurity Checklist When Designing a Family Office

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

Jenga! -- The Future of E-Discovery with Judge Peck and Judge Rodriguez at Exterro inFusion ‘16

Last week, Exterro’s annual user conference, inFusion 16, was in full swing, and for our visitors coming from points all over the U.S. and abroad, Oregon didn’t disappoint with its iconic weather – a mild fall mix of cool...more

Electronic Discovery Preparedness Audit Handbook

While your organization may not regularly be involved in costly or complicated litigation, there are instances in which it may nonetheless be required to identify, collect, and produce documents most likely in the form of...more

Electronic Discovery Preparedness Checklist

While your organization may not regularly be involved in costly or complicated litigation, there is always the potential for this to arise. Additionally, you may work in an industry that is heavily regulated and subject to...more

Another Challenge for Information Governance: The Defense of Trade Secrets Act

Good information governance requires not only protecting the security of sensitive and proprietary information; it often requires pursuing legal action against those who threaten the secrecy and value of a company’s trade...more

I am not a Crook: Avoiding the Politics of Data Preservation with a Defensible E-Discovery Process

Of course we've all heard about Hillary's emails, and Trump certainly has email trouble of his own. For a while, Politwoops kept track of mistweets and other online regrets even after they were deleted until Twitter (and...more

Wave of the Future: Or, How I Learned to Streamline the E-Discovery Process from Howard Hughes

In 1935, Howard Hughes built and flew his revolutionary H-1 Racer. At that time, most of the United States’ military aircraft (such as the Curtiss P-6 Hawk) still used the same designs from the previous decade: biplanes with...more

Spreadsheets No More: Technology and the Expanding Role of Paralegals in E-Discovery

The role of the paralegal started in the 1960's in an attempt to streamline the delivery and cost efficiency of legal services. Today, that goal remains, especially in the field of E-Discovery. As companies increasingly look...more

I’ve Made a Huge Mistake: Intentional Destruction of ESI is No Illusion

In season three of the series Arrested Development, episode 11 finds George Bluth, Sr. unsurprisingly using a giant electromagnet in an attempt to delete electronic computer files, which could potentially indict him for...more

Employment Law Reporter - May 2016

The Age of The Data Breach : The Top 5 Best Practices - What will you do? We live in The Information Age. Increasingly, business success depends on the ability to obtain, maintain and intelligently utilize increasing...more

Data security is top driver for information governance

A recent Advice from Counsel study sponsored by FTI Technology, entitled “The State of Information Governance in Corporations” found data security to be the top driver for information governance initiatives. The purpose of...more

Friday Funnies: Exterro's E-Discovery and IG Comics and Memes Page

We here at Exterro love E-Discovery! But it helps to have a sense of humor. That's why we created our E-Discovery and Information Governance Memes and Cartoons Series. And now you can go back and relive the magic...more

[Webinar] Working with IT / Legal Effectively - April 27th, 1:00pm ET / 10:00am PT

IT says tomato, Legal says tomahto. Legal reads Latin, IT writes Javascript. Whatever analogy you want to use, Legal and IT speak different languages that often presents challenges communicating and working effectively...more

Developing information governance efforts

In an information governance model, there are business-focused components and aspects, and there are technology-focused components and aspects. Information Governance isn’t just technology driven, nor is it solely business...more

Data Hoarders: 5 Tips for Managing Large Volumes of Corporate Data Without Sacrificing Defensibility

We've all seen (or at least heard of) the TV show Hoarders. We may even have a few candidates for an episode in our own social circles. I once worked a summer helping clean up a pig farm turned junkyard, and in the first wave...more

Data Valuation – Worth Zero or Trillions?

Almost every entity is, or is becoming, a digital enterprise. Today’s information economy mandates nothing less. Entities are making tremendous investments in order to exploit the vast amounts of data – Big Data – that are...more

Where are the File Cabinets? -- The Changing Face of Data in the 21st Century

When we think of electronic data files, of course we know they aren’t stored in tall metal cabinets with manila cards on the drawer faces denoting what’s inside. That’s so 1986. But even for those of us firmly grounded in...more

Ransomware Attack Highlights Importance of Preparation

Hollywood Presbyterian Medical Center in Los Angeles recently paid a $17,000 ransom in bitcoins to a malware hacker who seized control of the hospital's computer systems and demanded money ransom as a condition to returning...more

LegalTech New York 2016 Report

LegalTech New York 2016 took place in early February. Several Morris James attorneys and members of IT attended the event. As usual, the event attracted some of the best legal technology minds in the country....more

Trends, Challenges, Tech: E-Discovery Enters a New Era

E-Discovery is no longer in its infancy. A decade has passed since the 2006 FRCP amendment that made ESI discoverable, and in that time legal teams have been working out how best to successfully accomplish this process. ...more

The Life-Changing Magic of Information Governance: Cutting Costs and Mitigating Risk with IG

The New Year brings fresh starts, and most of us, after a season of giving and receiving, parties and celebrations, are feeling the need to take stock and streamline our lives. In the bestselling book, The Life-Changing...more

56 Results
|
View per page
Page: of 3
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×