More companies are allowing the use of so called “ephemeral messaging apps” to prevent IP leaks and confidential information from getting in the wrong hands. Ephemeral messaging is the transmission of encrypted multimedia messages that automatically or within a set period of time, disappears from the recipient’s device after the message has been viewed.Read more
What is Technology Assisted Review (TAR)? Although the technology and terminology are relatively new to the legal industry, the underlying technology itself, supervised machine learning, has been around for over fifty years—first in the field of information retrieval and later in areas such as digital marketing, onlinesales, and the financial industry. Supervised machine learning is a different approach to creating computer software: the machine learns from examples, rather than being explicitly programmed for a particular outcome.Read more
NightOwl has a long history of leadership and experience providing discovery management services to the life sciences sector. Working directly with many global medical device and pharmaceutical companies for over 25 years, NightOwl is an expert on bet-the-company litigation matters and large-scale regulatory investigations. Through this experience, we have developed customized life sciences industry specific workflows that help to streamline the unique needs of this sector. NightOwl accelerates case initiation, collection, filtering and review through deep understanding of life sciences data topography and through the use of advanced text analytics tools. This case study involves a recent matter and NightOwl’s approach to comprehensive discovery management.Read more
For legal counsel tasked with managing electronically stored information (ESI) in their companies, the growing push to include audio files as part of the universe of discoverable data is causing both trepidation and concern.
According to the Sedona Conference, “Electronically stored information includes email, web pages, word processing files, audio and video files [emphasis added], images, computer databases, and virtually anything that is stored on a
computing device–including but not limited to servers, desktops, laptops, cell phones, hard drives, flash drives, PDAs and MP3 players.”
After a recent EU Court decision invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of companies were left scrambling to decipher what that means for future cross-border discovery efforts.
Some companies are using the EU’s so-called “Standard Contractual Clauses” (also known as model clauses) in their legal language in an effort to safely continue data transfer out of the EU. Others plan to rely on the protections of the newly designed “Safe Harbor 2.0” arrangement, now known as the EU-US Privacy Shield.
For most companies, managing the spiraling cost and security of data subjected to litigation, regulatory requests and investigations has become a critical business issue.Read more
In an increasing number of cases, corporations are finding that relevant ESI located on those personal mobile devices may ultimately prove to be discoverable evidence in a litigation event.Read more
The threat environment is extremely fast-moving. In 2014, we saw data security go from niche IT issues to boardroom priority. This year, data security has gone mainstream. In the first few weeks of 2015, cybersecurity became part of the U.S. president's State of the Union address and the plot of a big-budget film.Read more
Technology Assisted Review: Using Analytics and Predictive Coding While Maintaining Integrity in the Discovery Process
Has the computer finally replaced the lawyer? Certainly not. While technology is playing an increasingly important role in discovery, it has not, and never will, replace the vitally important role of the lawyer.Read more
Information Governance is the topic “du jour” in many circles of the electronic discovery world. Corporations and law firms are increasingly creating roles to address those needs and issues; yet defining Information Governance is not so simple. This white paper focuses on a specific aspect of Information Governance – the defensible disposition of data.Read more