All Articles
Data Privacy
The How, When, Where, What and Who of Dealing with Data Breaches
Data breaches—and the associated exfiltration of data– are a harsh reality of our digital world. Business savvy organizations take all available steps to protect sensitive and confidential information from exfiltration and misuse, but hackers are sophisticated and don’t give up easily.
Read MoreAntitrust & Competition
Responding to Second Requests – There’s a Better Way
In the name of the “unique nature” of a Second Request review, experienced practitioners often maintain that only traditional protocols will work, and unhesitatingly accept a production set that may be upwards of 50% nonresponsive.
Read MoreE-Discovery
Support eDiscovery at scale to master modern work
Remote and hybrid work environments are here to stay and as corporate legal teams begin to reassess their needs in a post-pandemic environment, they are uniformly looking for ways to improve their prospects and transform their eDiscovery practices.
Read MorePrivacy
Curbing Insider Threats Today Requires a Holistic Approach
October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable information against outside hackers and cybercriminals that are always identifying new ways to get to your data.
Read MorePrivacy
The GDPR 4 years on and beyond
Organizations have transformed their IT infrastructure and improved their security and data governance posture to mitigate data privacy and protection risk.
Read MoreE-Discovery
Optimizing Subject Rights Requests
Part 1: Minimizing risks and costs through adaptive eDiscovery workflows
Read MoreE-Discovery
Level up E-discovery review efficiency – before review even starts
Using tools with front-loaded analytics is an approach to shaving time and costs off an E-discovery or investigation project that shouldn’t be left off the table.
Read More