All Columns

Mainstream Alternatives: Cyber & ESI Certifications Making Moves in a New Era

By Jared Coseglia, TRU Staffing Partners |

Choosing certifications and education to invest in continues to be challenging, but worthwhile, for legal professionals. Here’s a look at two more launching this year.

What Courts Have Said About the Legality of Data Scraping

By Paven Malhotra and Andrea Nill Sanchez, Keker, Van Nest & Peters |

Parties have sought to stop scrapers using a number of legal bases, from the CFAA to copyright law.

Internet of things (IoT) concept. Businessman presses IoT solution represented by symbol connected with icons of typical IoT. Intelligent house, car, camera, watch, washing machine. Smart digital home

IoT Gadgets: Exploring the New Sources of Discoverable Evidence

By Michael Ciaramitaro, FRONTEO |

Personal assistants, fitness trackers, and automotive black boxes are among the devices whose data and metadata may have big impact in legal cases.

The Critical Role of Sampling in Discovery

By Phil Favro, Driven |

Sampling can simplify the discovery process while reducing expenses and wasted opportunity costs.

4 Ways Legal Technology Helps Law Firms Protect Client Data

By Haley Altman, Doxly CEO |

Though software security protocols may seem overwhelming, ignoring them will lead to much higher costs in the aftermath of a breach.

‘Doing AI’: What Legal Should Remember About Big Data

By Adi Prakash, Yerra Solutions |

The term AI may be exploited in legal in present, but AI technology can be part of a revolutionary future—if there are some fundamental shifts.

Are Your Post-Breach Forensic Reports Privileged?

By Brian E. Ray, Cleveland-Marshall College of Law, Cybersecurity Law & Strategy |

The Central District of California recently joined the courts that have held forensic reports created by outside security companies following a data breach are protected from disclosure in civil litigation in some cases.

Corporate Transactions,Mergers.

Achieving Cultural Alignment After a Legal Tech Merger

By Ari Kaplan, Ari Kaplan Advisors |

Ari Kaplan spoke with Lighthouse eDiscovery’s Brian McManus about the aftermath of the company’s merger with Discovia and more.

The IGP and CFSR: Transitioning Your E-Discovery Career Into a Cybersecurity One

By Jared Coseglia, TRU Staffing Partners |

The second part of this look at cybersecurity education and certifications explores two certifications that touch on both cybersecurity and e-discovery: the IGP and CFSR.

Nothing to LOL About: E-Discovery of Texts On the Rise

By Ryan G. Pitman and James M. Paulino II, Goldberg Segalla |

Recent court decisions should put all organizations on notice: Texts are discoverable, and failure to plan accordingly may result in problems.

Fighting Fraud in France: How Sapin II and E-Discovery Technology Can Help

By James Farnell, KrolLDiscovery |

As Sapin II comes into force, it will be increasingly important to turn to technology solutions to audit compliance programs and investigate fraud.

Cloud computing

E-Discovery Research Reveals a Focus on Cloud Adoption, In-Sourcing and Client Service

By Ari Kaplan, Ari Kaplan Advisors |

Ari Kaplan on his research of in-house and Am Law 200 e-discovery counsel, exploring current challenges and where companies are making investments.

The Texas Supreme Court Provides a ‘Form of Production’ Road Map for Litigants

By Carolyn Southerland, Morae Global |

Through In re State Farm Lloyds, Relator, the court provided a road map for resolution of parties’ disputes regarding form of production in e-discovery.

5 Legal Consequences of Diving ‘All In’ on Social Media

By Benjamin Znaty and Marc Schuler, Bird & Bird |

Companies and lawyers should begin to learn the laws of individual platforms before trying to apply national and local legal concepts.

Overcoming the E-discovery Shot Clock Challenge

By Howard Reissner, Planet Data |

By marrying people and technology, mid-sized firms can go to the hoop more often, with more success, even with a shortened time to litigation.

Modern Oversight of Modern Information Risk

By Matt Kelly, RadicalCompliance |

No company can ever ‘solve’ the problem of information risk, but with the right policies and technology, they can govern it.

Ways to Encourage Adoption of 3 Key Legal Tech Solutions

By Thomas Suh, LTL Attorneys |

Encouraging attorneys in your firm to adopt TAR, case management tools and artificial intelligence may be difficult, but it is increasingly necessary.

Ask the Legal Tech Marketer: How to Maintain Long-Term Client Satisfaction

By LTN Staff |

Industry insiders provide tips on providing the services needed to guarantee client satisfaction.

A Sample Solution: The Hybrid Technique for Validating Categorical Privilege Logs

By Kathleen McDowell and Bobby Malhotra, Munger, Tolles and Olson |

This hybrid approach to privilege logging can reduce the number of documents to be individually logged while providing transparency and defensibility.

Ransomware: The Good, the Bad and the Ugly

By Mark Sangster, eSentire, Cybersecurity Law and Strategy |

Ransomware has quickly emerged as a billion dollar industry and shows no sign of slowing down. So why is ransomware the ubiquitous nuisance it is? Simple: It works.

Where Machine Learning and AI Fit into the Legal Research Puzzle

By Ari Kaplan, Ari Kaplan Advisors |

On a recent podcast, Ari Kaplan spoke with LexisNexis’s Jeff Pfeifer on machine learning, Big Data, and the possibilities of analytics with today’s tools.

Don't Forget Small Data: Inside GE Select Connect

By Brad Blickstein, Blickstein Group |

Intimidated by Big Data? GE's law department believes it found a simple answer.

Woman checking heart rate

3 Ways Wearables Are Impacting Lawyers

By Monica Zent, ZentLaw |

A look at what lawyers are doing now to help their practice through such wearables as smart watches.

Prescriptive Modelling: The Future of Data Analytics?

By Rhys Dipshan |

Speakers at the Corporate Legal Operations Consortium (CLOC) Conference will try to educate legal departments about using metrics to understand and meet future challenges.

It's Not You, It's Your Vendor: The Hidden Doorway to Phishing Attacks

By Eric Chuang and Doug Herman, BDO Consulting |

Without understanding the potential vulnerabilities service providers may bring, there is not much to protect organizations from highly sophisticated phishing attacks.