Companies audit their third party service providers for many competencies, like security. Why not the competence to do their jobs efficiently? That’s what D. Casey Flaherty did during his tenure as inside counsel for Kia Motors America. He wrote about his experience for the Jan. 24, 2013,
Read more →Today’s discovery teams must pick relevant information from mountains of similar-looking documents. To speed up the process, they can now have computers find relevant documents instead. The smorgasbord of technologies used to do this is called both technology assisted review (TAR) and computer-assisted review (CAR). These technologies are
Read more →Whether a case centres on employee theft, insurance fraud, intellectual property theft or a range of other matters, cell phones and other mobile devices can contain “relevant information that shouldn’t be ignored,” says Chuck Rothman, director of e-discovery services for Wortzman Professional Corporation. “Information on phones can
Read more →Phones, tablets and notebook computers help lawyers be more productive, since they connect to the law firm network when the lawyer is out of the office. They also represent an information security risk because they connect to the law firm network while the device is out of
Read more →Having a recovery plan is indispensable for your system’s inevitable crash Ben Sapiro well knows the meaning behind the metaphor “like closing the barn door after the horse escapes.” When lawyers call him about disaster recovery, it’s usually because something has already happened. “Very often, questions come after
Read more →Used as data rooms, lawyers can share confidential information. Physical “deal rooms” house documents pertaining to confidential activities such as mergers and acquisitions. Access to such rooms is controlled. No photocopiers are found within, and no cameras allowed inside. Brock Smith, a Vancouver-based partner in the technology
Read more →Towards the end of the dystopian 2013 satire The Circle, by Dave Eggers, the protagonist wears a front-facing wearable camera and microphone device that livestreams (except for bathroom breaks) her every waking moment to millions of followers. In the real world, Toronto Police Services recently announced a
Read more →Creating email rules can sometimes seem like a complex bit of weaving. Once your list of rules grows lengthy, you might find that emails don’t take on the criteria (proper folder location, category, whether they’re deleted or not and so forth) that you expect. Email rules are
Read more →Having difficulty understanding big data? Don’t examine it on the Internet. Instead, look at your own company’s version of it. From e-mail systems to invoicing to accounts payable to text messaging to document sharing to HR, the list of disparate systems on which a business relies can
Read more →