Compliance into the Weeds: Unsexy Keys to Data Analytics for Compliance Programs
A Less is More Strategy for Data Risk Mitigation
Data Retention and Document Holds
Fintech Focus Podcast | Navigating IT and Security Risks in Fintechs in Light of Impending DORA Deadline
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
eDiscovery Needs Digital Forensics for a Mobile World
When AI Meets PI: Assessing and Governing AI from a Privacy Perspective
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
eDiscovery Tips: Helpful Questions to Ask Your Clients
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Managing Large Scale Review Efficiency: Tips From a GC
Record Retention and Information Governance
Review Analytics for a New Era
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 114: Joe Dickinson, Cybersecurity Attorney Nexsen Pruet
Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Innovation in Compliance - Episode 224 - Leveraging Communications as an Asset with Robert Cruz
Modernize your Information Governance: Building a Framework for Success
NGE On Demand: Cybersecurity Considerations for Emerging Companies with Michael Gray and David Wheeler
eDiscovery refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format. eDiscovery tools can also be...more
Editor’s Note: During a recent HaystackID webcast, expert panelists explored the role of the Committee on Foreign Investment in the United States (CFIUS) in protecting sensitive technologies, classified contracts, and other...more
Nextpoint and Tom O’Connor published a new edition of eDiscovery for the Rest of Us, a strategic and tactical resource for legal teams navigating the modern ediscovery landscape. The 2024 version features new content,...more
This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more
5 Questions is a periodic feature produced by Cornerstone Research, which asks our professionals, senior advisors, or affiliated experts to answer five questions. We interview Mike DeCesaris, vice president of Cornerstone...more
As we previously discussed, earlier this year the National Institute of Standards and Technology (NIST) launched the Trustworthy and Responsible AI Resource Center. Included in the AI Resource Center is NIST’s AI Risk...more
Information governance (IG) plays an increasingly significant role of the way corporations do business. But what do organizations do with all their data? Where do they store it—and is it secure, well organized, and...more
Editor’s Note: In this insightful webcast hosted by HaystackID on April 19, 2023, our expert panel delved into the best practices for selecting, staffing, and supporting complex and high-velocity legal document reviews. The...more
In Part 1 of this article, I addressed various legal issues that can arise with AI-based code generators. Many of these problems stem from using open source to train the models and the compliance obligations imposed by the...more
AI-based code generators are a powerful application of generative AI. These tools leverage AI to assist code developers by using AI models to auto-complete or suggest code based on developer inputs or tests. These tools raise...more
[Foreword by Geoffrey Vance: Although this article is technically co-authored by Jan and me, the vast majority of the technical discussion is Jan’s work. And that’s the point. Lawyers aren’t supposed to be the Captains of the...more
Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more
Guidelines and frameworks are usually born out of a desire to streamline and perfect processes. But sometimes progress calls for undoing those traditions and entering a new paradigm. Such is the case when it comes to the...more
The well-documented benefits of moving to the Cloud include speed, security, and scale, but none may impact your business more than cost recovery. To help you analyze how you can enhance your bottom line, we’ve compiled this...more
To answer this question, organizations need to ponder when AI will be most effective. Beneficial features to look for when investing in new technology are whether it will add business value, increase efficiency, enhance...more
Cloud computing is trending today, and for good reasons. Reports from Flexera show that 50% of decision-makers in organizations believe that migration to the cloud will continue to increase. While some consider it a...more
Last week on eDiscovery Today, I covered Andrew Haslam’s annual eDisclosure Systems Buyers Guide, which was published last week on Rob Robinson’s ComplexDiscovery site here. As you can imagine, it’s difficult to cover a...more
Lawyers, ask yourselves: Can I ethically connect my work laptop computer to an unsecured public Wi-Fi network? What data security measures are in place at the technology vendors that store and process my clients’...more
The role and responsibilities of your organization’s legal operations department are constantly evolving, increasing and growing more complex. To reflect this, the Corporate Legal Operations Consortium (CLOC) has defined...more
It’s that season again; not just for celebrating a new year, but for making predictions about it…and beyond. Especially when it comes to what may lie ahead in Legal Ops, data privacy, and information governance. ...more
We used to know them as ‘scanning solutions’. With the advent of the CD in the mid-80’s, there suddenly arrived a new medium for storing data which ensured that the data could not be tampered with. ...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more