Powered by Translate

White Papers


  • Ephemeral Data

    More companies are allowing the use of so called “ephemeral messaging apps” to prevent IP leaks and confidential information from getting in the wrong hands. Ephemeral messaging is the transmission of encrypted multimedia messages that automatically or within a set period of time, disappears from the recipient’s device after the message has been viewed.

    [Download Full White Paper]
  • Technology Assisted Review

    What is Technology Assisted Review (TAR)? Although the technology and terminology are relatively new to the legal industry, the underlying technology itself, supervised machine learning, has been around for over fifty years—first in the field of information retrieval and later in areas such as digital marketing, onlinesales, and the financial industry. Supervised machine learning is a different approach to creating computer software: the machine learns from examples, rather than being explicitly programmed for a particular outcome.

    [Download Full White Paper]
  • Complete Discovery Management: Life Sciences

    NightOwl has a long history of leadership and experience providing discovery management services to the life sciences sector. Working directly with many global medical device and pharmaceutical companies for over 25 years, NightOwl is an expert on bet-the-company litigation matters and large-scale regulatory investigations. Through this experience, we have developed customized life sciences industry specific workflows that help to streamline the unique needs of this sector. NightOwl accelerates case initiation, collection, filtering and review through deep understanding of life sciences data topography and through the use of advanced text analytics tools. This case study involves a recent matter and NightOwl’s approach to comprehensive discovery management.

    [Download Full White Paper]
  • Best Practices for Handling Audio Files in Discovery

    For legal counsel tasked with managing electronically stored information (ESI) in their companies, the growing push to include audio files as part of the universe of discoverable data is causing both trepidation and concern.

    According to the Sedona Conference, “Electronically stored information includes email, web pages, word processing files, audio and video files [emphasis added], images, computer databases, and virtually anything that is stored on a
    computing device–including but not limited to servers, desktops, laptops, cell phones, hard drives, flash drives, PDAs and MP3 players.”

    [Download Full White Paper]
  • International eDiscovery and the EU-US Privacy Shield

    After a recent EU Court decision invalidated the Safe Harbor protections for transferring data from the EU to the U.S., hundreds of companies were left scrambling to decipher what that means for future cross-border discovery efforts.

    Some companies are using the EU’s so-called “Standard Contractual Clauses” (also known as model clauses) in their legal language in an effort to safely continue data transfer out of the EU. Others plan to rely on the protections of the newly designed “Safe Harbor 2.0” arrangement, now known as the EU-US Privacy Shield.

    [Download Full White Paper]
  • Reduce Costs, Save Time and Gain Efficiencies by Preserving Discovery and Document Review Work

    For most companies, managing the spiraling cost and security of data subjected to litigation, regulatory requests and investigations has become a critical business issue.

    [Download Full White Paper]
  • Best Practices for Managing ESI on Mobile Devices

    In an increasing number of cases, corporations are finding that relevant ESI located on those personal mobile devices may ultimately prove to be discoverable evidence in a litigation event.

    [Download Full White Paper]
  • Information the New Gold: Securing Your Valuable IP in Patent Litigation

    The threat environment is extremely fast-moving. In 2014, we saw data security go from niche IT issues to boardroom priority. This year, data security has gone mainstream. In the first few weeks of 2015, cybersecurity became part of the U.S. president's State of the Union address and the plot of a big-budget film.

    [Download Full White Paper]
  • Technology Assisted Review: Using Analytics and Predictive Coding While Maintaining Integrity in the Discovery Process

    Has the computer finally replaced the lawyer? Certainly not. While technology is playing an increasingly important role in discovery, it has not, and never will, replace the vitally important role of the lawyer.

    [Download Full White Paper]
  • Avoiding an Information Crisis

    Information Governance is the topic “du jour” in many circles of the electronic discovery world. Corporations and law firms are increasingly creating roles to address those needs and issues; yet defining Information Governance is not so simple. This white paper focuses on a specific aspect of Information Governance – the defensible disposition of data.

    [Download Full White Paper]

Ephemeral Data


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Technology Assisted Review


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Complete Discovery Management: Life Sciences


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Best Practices for Handling Audio Files in Discovery


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

International eDiscovery and the EU-US Privacy Shield


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Reduce Costs, Save Time and Gain Efficiencies by Preserving Discovery and Document Review Work


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Best Practices for Managing ESI on Mobile Devices


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Information the New Gold: Securing Your Valuable IP in Patent Litigation


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Technology Assisted Review: Using Analytics and Predictive Coding While Maintaining Integrity in the Discovery Process


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Avoiding an Information Crisis


Fill out the form below to receive a full copy of this White Paper in PDF format.

Name (required)

Company (required)

Email (required)

Page 1 Page 2