Posts Tagged e-discovery

Streamlining document review with technology

Today’s discovery teams must pick relevant information from mountains of similar-looking documents. To speed up the process, they can now have computers find relevant documents instead. The smorgasbord of technologies used to do this is called both technology assisted review (TAR) and computer-assisted review (CAR). These technologies are

Read more

Mobile devices gaining importance in probes

Whether a case centres on employee theft, insurance fraud, intellectual property theft or a range of other matters, cell phones and other mobile devices can contain “relevant information that shouldn’t be ignored,” says Chuck Rothman, director of e-discovery services for Wortzman Professional Corporation. “Information on phones can

Read more

Securing the gateway to confidential information

Phones, tablets and notebook computers help lawyers be more productive, since they connect to the law firm network when the lawyer is out of the office. They also represent an information security risk because they connect to the law firm network while the device is out of

Read more

Software makers respond to spam law

Earlier this year, in reaction to Canada’s anti-spam legislation (CASL), various organizations flooded their contacts’ inboxes across the country with requests for permission to continue sending them e-mails. Software developers also responded, marketing systems that help businesses comply with CASL. Knowing little about CASL or the systems being

Read more

Data disasters are waiting to happen

Having a recovery plan is indispensable for your system’s inevitable crash Ben Sapiro well knows the meaning behind the metaphor “like closing the barn door after the horse escapes.” When lawyers call him about disaster recovery, it’s usually because something has already happened. “Very often, questions come after

Read more

The virtual deal room is now more advanced

Used as data rooms, lawyers can share confidential information. Physical “deal rooms” house documents pertaining to confidential activities such as mergers and acquisitions. Access to such rooms is controlled. No photocopiers are found within, and no cameras allowed inside. Brock Smith, a Vancouver-based partner in the technology

Read more

Wearable technology raising many legal concerns

Towards the end of the dystopian 2013 satire The Circle, by Dave Eggers, the protagonist wears a front-facing wearable camera and microphone device that livestreams (except for bathroom breaks) her every waking moment to millions of followers. In the real world, Toronto Police Services recently announced a

Read more

One rule to rule them all

Creating email rules can sometimes seem like a complex bit of weaving. Once your list of rules grows lengthy, you might find that emails don’t take on the criteria (proper folder location, category, whether they’re deleted or not and so forth) that you expect. Email rules are

Read more

To make sense of big data, look inward

Having difficulty understanding big data? Don’t examine it on the Internet. Instead, look at your own company’s version of it. From e-mail systems to invoicing to accounts payable to text messaging to document sharing to HR, the list of disparate systems on which a business relies can

Read more

10 smartphone security tips

Ryan Fahey at InfoSec Institute sent me an article about security tips for Android phones. After I read it, I realized the title of the article implies a scope much narrower than the article offers. The tips in this article go beyond just Android – they apply to

Read more
Page 1 of 3123