eDJ Migrated

These blogs were written between 2012-2018.

No Fear and Loathing at the AccessData User’s Conference in Las Vegas

Migrated from eDJGroupInc.com. Author: . Published: 2012-05-23 09:00:10  Editors Note:  This article was originally published on May 21, 2012 on the eDiscoveryInsight site.  A copy of the original article can be found here. Mikki Tomlinson and I were lucky to go to the AccessData Users Conference (ADUC) two weeks ago in Las Vegas.  Now it doesn’t take a great deal to get me to [...]

By |2024-01-12T16:07:10-06:00January 12th, 2024|eDJ Migrated|0 Comments

More on Separating the Wheat from the eDiscovery Software Chaff

Migrated from eDJGroupInc.com. Author: Mikki Tomlinson. Published: 2012-05-23 14:00:20  Chuck Rothman wrote a great post on Separating the Wheat from the eDiscovery Software Chaff last week.  I would like to expand on that and take it two steps further.  If you are evaluating software for purposes of a long-term partnership with a preferred vendor or are making the commitment to bring something behind your [...]

By |2024-01-12T16:07:10-06:00January 12th, 2024|eDJ Migrated|0 Comments

Inside and Outside Counsel Need to Implement Stronger Social Media Policies

Migrated from eDJGroupInc.com. Author: Kevin L. Nichols. Published: 2012-05-24 09:00:21  Recently, a CFO from Francesca's Holdings Corp, a Houston based company, was fired for wrongfully disclosing sensitive non-public information via social media.  In general, it is difficult and nearly impossible to prohibit employees to have LinkedIn, Facebook, and Twitter accounts for personal use, let alone monitor them effectively.  However, this incident involved an executive/board [...]

By |2024-01-12T16:07:10-06:00January 12th, 2024|eDJ Migrated|0 Comments

eDiscovery Software Winners And Losers Update

In our piece earlier this week on the pool of winners and losers in the eDiscovery software market, we made some mistakes and omissions. The mistakes we can eliminate in the future with better editorial processes (we are a growing, learning organization like everyone else). The omissions will happen from time to time, especially in a market with so many small yet innovative vendors. It is a constant challenge to keep up with the complex offering of the large software providers in addition to the many point solutions that exits. Thankfully, we have readers that keep us on our toes and remind us when we make a mistake or forget to include all the relevant players.

By |2024-01-12T16:07:10-06:00January 12th, 2024|eDJ Migrated|0 Comments

Cloud Providers and Information Governance

Migrated from eDJGroupInc.com. Author: Steve Markey. Published: 2012-05-29 09:00:01  This past week I was at the Business of the Cloud conference in Dallas, TX and sat next to Adam Swidler, a senior manager at Google.  He went on to educate me about Google Vault and their retention functionality.      And, as I sat there playing around on my iPad with this new service (an improvement from [...]

By |2024-01-12T16:07:10-06:00January 12th, 2024|eDJ Migrated|0 Comments

Is Your Privilege Mired in Your TAR?

Technology Assisted Review (TAR) has dominated our recent briefing sessions with providers and consumers alike. Consumers want eDJ to clarify the terminology, technology and market hype surrounding recent cases. Providers have expressed their frustration with the portrayal of TAR as some kind of ‘Easy Button’ that will magically reduce your review expense by 95%. Really. We are hearing second hand stories like, “But VendorX says his system only needs to train with 5%.” Early TAR innovators like DiscoverReady’s CEO Jim Wagner long ago understood that, “It’s not the technology. It’s the people and process.” That can be a complicated message for a relatively unsophisticated consumer who reads blogger headlines instead of the actual transcripts. Discovery and review cease to be easy or routine as the volume and composition of potential collections exceed the ability of a single reviewer to manually code every item. Beyond simple relevance the additional complexities of privilege in TAR keep coming up in our briefings.

By |2024-01-12T16:07:09-06:00January 12th, 2024|eDJ Migrated|0 Comments

Responding to Government Requests for eDiscovery Front and Center in NYC

Migrated from eDJGroupInc.com. Author: . Published: 2012-05-30 09:00:33  I was in New York City last week for some meetings and to attend the UBIC seminar at the lovely Harvard Club in midtown.  UBIC has been on my radar for awhile since they are an Asian company trying to enter the US market.  I have a personal interest in international data privacy rules and the [...]

By |2024-01-12T16:07:09-06:00January 12th, 2024|eDJ Migrated|0 Comments

Filers vs Finders – The Challenge of Defining Records

Do you file your critical email in folders or just search for what you need? Filer or finder does not matter until your company decides to clean up its digital landfills. Records management sounds easy at first. Users designate actual business records and some system expires (deletes) non-record communications and loose Office files after an acceptable time for business use. Microsoft introduced Managed Folders for Outlook 2007 to support this exact process. Although they could have replicated the same functionality into normal file shares (directories), they chose to nudge the market to migrate loose content to Sharepoint for many reasons. The entire ‘foldering’ concept is dependent on overburdened users taking the time and effort to make active decisions on every email they send or receive. Many users have given up trying to file email or files into the appropriate folders and instead just rely on Outlook/Windows search (weak) or aftermarket desktop search engines like X1 or ISYS to find items when they need them. So how does a company minimize user (and productivity) impact while implementing a selective retention initiative (i.e. stop keeping everything)?

By |2024-01-12T16:07:09-06:00January 12th, 2024|eDJ Migrated|0 Comments

Litigation Hold Series Part One: Leveraging Your Information Security Risk Procedures

Migrated from eDJGroupInc.com. Author: Amber Scorah. Published: 2012-06-04 12:55:01  The best way to avoid costly disputes over the adequacy of eDiscovery processes and collections is to build a defensible litigation hold business process.One means of doing this is by leveraging a company’s information security capabilities.  Security risk assessment procedures can be used as an aid in building a defensible process around the execution of [...]

By |2024-01-12T16:07:09-06:00January 12th, 2024|eDJ Migrated|0 Comments

EDRM Model Code of Conduct for the eDiscovery Industry

Migrated from eDJGroupInc.com. Author: . Published: 2012-06-06 12:37:48  I recently spoke with Eric Mandel, National eDiscovery Counsel with Zelle Hofmann in Minneapolis, about the EDRM Model Code of Conduct (MCoC), which was officially published late last year.   The EDRM Model Code of Conduct project was initiated in May 2007 by many EDRM participants who were concerned about the lack of ethical direction for those [...]

By |2024-01-12T16:07:09-06:00January 12th, 2024|eDJ Migrated|0 Comments
Go to Top