This week Microsoft added an automated transcription feature to their online Word. It is easy to use and renders a surprisingly accurate transcript that differentiates between speakers and keeps the times of the conversation segments. This is great from a user perspective. Why bother to keep meeting notes when you have a free transcript of everything said? It does present some challenges to your [...]
With a majority of our key employees working remotely via Zoom meetings, conference calls and various chat platforms Microsoft has just added automatic transcription functionality to user’s online Word application. This functionality enables users to convert previously recorded or live audio into a pretty good transcript that differentiates between speakers and has an associated xml file with the segment times. Tech savvy users have [...]
Having supported far too many FCPA investigations over the last 30 years, the hardest initial step is untangling the key employees, contractors, agents and foreign players involved in doing business overseas. The TGC article provides a solid checklist for compliance defensibility that many corporate clients would shy away from because of the heavy manual overhead required. Most enterprise content management systems now include categorization/tagging [...]
Globanet has been expanding their connectors and their repository integrations like Relativity and Veritas eDP (Clearwell) with every new release. I have not yet run into Facebook’s Workplace ($0-$8/month) in the field, but the pressure of adapting to remote working is bound to get some departments playing with it. As with Yammer, Jabber, Slack and others social collaboration platforms, Workplace does not appear to [...]
Epiq’s “Ruyk” ransomware attack in February cut off customer access to their hosted discovery matters for roughly three days. This outages constitutes a major service interruption and violation of normal Service Level Agreements for one of the largest global legal service providers. Beyond SLA penalties, missed production deadlines and unhappy customers, Epiq is now facing a potential class action suit under the new California [...]
Ideally case studies lay out enough information about the challenges, pain points, approach strategies and metrics to calculate a decent ROI and give readers a peak into solving a particular problem. This SEC inquiry case study focuses on search/review/production issues for new generation collaboration systems like WhatsApp. Deduplication and conversation thread reconstruction is indeed a pain point, especially when execs were using multiple mobile [...]
While I am happy to see nimble cloud eDiscovery providers tackling the processing/review of mobile device ESI, I still want to see practical solutions for ongoing mobile device preservation and remote collection.
The Covid-19 pandemic has made remote work and home offices the new normal. Many corporations have already consolidated large corporate headquarter leases to the minimum footprint. The migration of large corporate data centers to Amazon S3 or Azure cloud servers has been going on for the last decade. So where does your critical ESI under hold live now? The reality is that your custodian’s [...]
I was reading a well researched news story in the aftermath of the Fort Lauderdale protests that turned into a violent confrontation between police and protesters. Several items caught my attention that could have impact on events that result in litigation/discovery during this time of discord. Body Worn Cameras (BWC) and video surveillance are more commonplace now than ever. Many of my industrial clients require that certain employees wear BWCs or have vehicle/facility cameras that operate on similar technologies. I intend to stay away from politics on essays in the eDiscovery Journal. As a former police criminalist I am very interested in evolving technologies to record and reconstruct incidents. In this and many other recent confrontations, police departments state that BWC footage is not available because the cameras were not turned on. Let’s discuss what data is available to an investigator or requesting party.