Why Lawyers Can't Ignore eDiscovery
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
To Unlock AI’s Power, Think Predictive to Generative
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
eDiscovery for the Rest of Us: Why Small Firm eDiscovery Matters
The Great Link Debate and the Future of Cloud Collaboration
Why Your eDiscovery Program and Technology Need Scalability
Bar Exam Toolbox Podcast Episode 237: Listen and Learn -- Discovery (Civ Pro)
#CaseoftheWeek with Kelly Twigger: Latin Markets Brazil, LLC v. McArdle
Podcast - Inteligencia Artificial
LFLM LAW with L.A.W - Discovery for Covid-19 Claims
Chemical Engineering Expert Witness Experience & Discovery – IMS Insights Podcast Episode 48
JONES DAY PRESENTS®: The Mechanics of Multidistrict Litigation: Streamlining Complex Cases
Bar Exam Toolbox Podcast Episode 204: Listen and Learn -- Scope of Discovery and the Work-Product Privilege
A Look at the Metaverse’s Legal Implications, with Special Guest Samantha Green, Director of Content Marketing, Epiq
Recent Trends in Class-Action Consumer Finance Litigation - The Consumer Finance Podcast
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
Join our enlightening webinar to explore the critical role of data discovery in constructing a comprehensive and accurate data inventory, essential for streamlining privacy compliance and enhancing data governance. In this...more
Something keeping you up at night? It just might be the data risks hiding in your e-discovery process. Join us for an in-depth webinar on "Uncovering E-Discovery Data Risks: How to Identify and Mitigate Hidden Threats Before...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
Legal data volumes have exploded in our modern digital age, which can translate to huge cost increases if not handled properly. It’s more important than ever for legal teams to make strategic decisions at the outset of a case...more
These apply equally to governments, private companies, and individuals of all backgrounds facing litigation. Following these tips should foster better relationships with counsel, and potentially lead to lower costs, and...more
These days, companies are investing more effort in conducting thorough internal investigations to root out and resolve issues of misconduct and prevent their recurrence. There are many factors behind this trend. With the rise...more
As we witness the surge of the COVID-19 pandemic across the globe, more and more businesses implement their (partial) return-to-office policies. While each organization has its own view on which workplace model fits them...more
Lawyers handle tremendous amounts of sensitive information every day: their clients’ personal data, including both personally identifiable information (PII) and protected health information (PHI), intellectual property, trade...more
As businesses continue to globalize, so does the demand for global data in litigations, regulatory matters, and internal investigations. When thinking about eDiscovery from a global perspective, one size does not necessarily...more
What the heck is a “SWOT” analysis? And, why do you need one? A “SWOT” analysis is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats associated with an organization or a...more
Marc Zamsky has been involved in the eDiscovery provider community since 1996. He joined Compliance in May 2013 as the Chief Operating Officer. In that role, Marc expanded the eDiscovery solutions offered by Compliance by,...more
Effective as of January 1, 2020, the California Consumer Privacy Act (CCPA) gives broad rights to people on their personal data in the custody of companies. This focus on data rights significantly raises the compliance burden...more
For as long as humans have been writing things down, redactions have been a part of the process. In the beginning, they were used to integrate disparate stories and folktales, but these days, when we hear about redactions,...more
The Background: Technology has transformed the way that directors receive and review information and communicate with each other and with management. The Issue: Although many modern board practices are more secure and...more
GDPR: A Snapshot - The GDPR updates the EU’s 1995 framework data privacy law—which is outdated due to the technological advances that have occurred since the mid-1990s. The European Commission proposed the GDPR in 2012,...more
When assisting clients with emergency data breach response, and preparing and implementing a data privacy and security plan, it often becomes efficient, cost effective and necessary to hire outside vendors to assist with...more
When people think of high risk data, most think of Personal Health Information and Personally Identifiable Information as it relates to HIPAA and the health care industry, but Steve Shebest’s very informative article “High...more
The transportation industry is always searching for new technology and best practices that can eliminate or reduce risky driving behavior, improve the overall efficiency and effectiveness of fleets, and avoid frivolous and...more