All Articles

Data Privacy

The How, When, Where, What and Who of Dealing with Data Breaches

Data breaches—and the associated exfiltration of data– are a harsh reality of our digital world. Business savvy organizations take all available steps to protect sensitive and confidential information from exfiltration and misuse, but hackers are sophisticated and don’t give up easily.

Read More

Antitrust & Competition

Responding to Second Requests – There’s a Better Way

In the name of the “unique nature” of a Second Request review, experienced practitioners often maintain that only traditional protocols will work, and unhesitatingly accept a production set that may be upwards of 50% nonresponsive.

Read More

E-Discovery

Support eDiscovery at scale to master modern work

Remote and hybrid work environments are here to stay and as corporate legal teams begin to reassess their needs in a post-pandemic environment, they are uniformly looking for ways to improve their prospects and transform their eDiscovery practices.

Read More

Privacy

Curbing Insider Threats Today Requires a Holistic Approach

October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable information against outside hackers and cybercriminals that are always identifying new ways to get to your data.

Read More

Privacy

The GDPR 4 years on and beyond

Organizations have transformed their IT infrastructure and improved their security and data governance posture to mitigate data privacy and protection risk.

Read More

E-Discovery

Optimizing Subject Rights Requests

Part 1: Minimizing risks and costs through adaptive eDiscovery workflows

Read More

E-Discovery

Level up E-discovery review efficiency – before review even starts

Using tools with front-loaded analytics is an approach to shaving time and costs off an E-discovery or investigation project that shouldn’t be left off the table.

Read More