Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Strategy Considerations for Global Litigation
In-house Roundhouse: Antitrust and the Tech Industry
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Episode #9 - Blockchain Basics with Trokt's Chris Draper
Compliance Perspectives: The Ethics of Data
Episode #7 - It's All About Latency: The Future of Data Processing and Storage
Compliance Perspectives: Regulatory Conflicts in Data Privacy Laws
Podcast: Private Fund Regulatory Update – Network and Cloud Storage
E14: The Three Pillars of GDPR
Straight Talks: Data privacy and cybersecurity in the age of rolling smart devices
Need Assessment, Vetting, and Identification of a Reliable Expert in the Digital Forensics Process - Whether your organization is looking for advisory and expert support for an internal investigation into allegations of...more
Join Us for eDiscovery Convergence 2024! This event is proudly hosted by the Ontario Digital Evidence and eDiscovery Working Group (DEED) and the Toronto Chapters of The Association of Certified eDiscovery Specialists...more
The digital revolution of the late 20th century brought a tidal wave of electronically stored information (ESI). Emails, digital documents, and other forms of electronic data began to dominate business and personal...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
The rapid pace of technological advancement poses significant challenges in eDiscovery and legal proceedings, particularly when it involves extracting data from a variety of devices. Solutions that fail to evolve alongside...more
What is a Gigabyte? Seems really obvious, right? But maybe not. At the time of collection, a gigabyte may be data downloaded from O365 or Gmail, information extracted from a cell phone, or even (historically) a whole disk...more
In our adversarial justice system, litigants rely on evidence to explain their side of a dispute. Today, much of that evidence is digital. If an organization allows digital evidence to be compromised, lost, or destroyed, it...more
Employee data theft happens frequently, and especially in current times where employees are leaving or being terminated. Some may be due to layoffs while others may leave for personal or other reasons. However, there is...more
As the corporate workplace continues to evolve—encompassing hybrid work environments, bring your own device policies, and cloud-based storage—companies are well-advised to consider areas of increased vulnerability and whether...more
While the interconnected nature of Microsoft 365 can be a dream for employee productivity, it poses significant challenges for IT and corporate legal teams when it comes to collecting and governing data. From retention and...more
When it comes to making sure financial data is safe and meets compliance regulations, understanding the different regulatory bodies and how they affect your organization is a vital first step. Two of the most common...more
With over 300 million active daily meeting participants and counting, Zoom’s vast adoption has generated new concerns for legal and IT teams. Just like any other app that holds critical business data, the discoverability of...more
Managing data preservation for ediscovery requires walking on a knife’s edge. As soon as you can reasonably anticipate a litigation matter, you must rapidly identify and preserve any relevant data. But between litigation...more
The beginner’s guide to Microsoft Teams eDiscovery - Welcome to our Beginner’s Guide to Microsoft Teams eDiscovery — where we’ll cover everything you need to know about eDiscovery for Microsoft Teams, the communication and...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
There are a lot of people in the legal-tech community talking about the discoverability of Zoom data these days, particularly as the move to a remote workforce continues in the wake of the COVID-19 pandemic. As far as...more
There is no denying that communication (or the lack thereof) can be an obstacle when it comes to reaching objectives. For a global organization this can mean the literal languages between stakeholders in different countries,...more
The left side of the EDRM (Identify, Preserve, and Collect) is the least expensive part of the eDiscovery process however, it can hold the biggest value because improper collections can result in having to repeat the entire...more
Looking for a great weekend read? You could turn to a classic novel, work your way through the list of articles you were too busy to read at work, or curl up with your favorite beverage and reread Securities Exchange...more
With 2018 in the archives, Hanzo is starting off the new year with a look ahead to the trends and challenges we believe will define the compliance and eDiscovery landscape in 2019, and a look back at the year that was at...more