Daily Report Online | Commentary
By Todd Heffner | May 28, 2019
Altering the default document-by-document privilege log is probably the best way to reduce the pain of privilege logs.
By Adam Kuhn, OpenText | May 28, 2019
AI and machine learning technologies are emerging from the beta phase and taking center stage to transform traditional information governance solutions into key enablers of the intelligent connected law firm.
By Robert Cruz, Smarsh | May 23, 2019
A next-gen E-Discovery Playbook calls for the use of modern review technologies that are focused on understanding the data—not just how to improve the review rates of documents.
By Jared Coseglia, TRU Staffing Partners | May 22, 2019
CloudNine has relaunched the certification and training program of acquired LexisNexis tool LAW. Jared Coesglia breaks down the changes and what e-discovery practitioners should watch for.
By Benjamin Sexton, JND and Maren Strandevold, Haynes & Boone | May 21, 2019
In reality, the GDPR is focused on protecting individuals and safeguarding data from data processing giants like Facebook and Google, not on restricting the flow of information or legitimate uses of data.
By Garth Landers, Mimecast | May 20, 2019
Cybersecurity is a challenging issue that modern organizations are working to face. Unfortunately, many of them are responding in a reactive manner, rather than a proactive one, knocking them on their heels when an incident does strike.
By Toby Bond and Clara Clark Nevola, Bird & Bird | May 20, 2019
Governments are increasingly making use of AI tools to help with decision making, but they face a key challenge: ensuring fairness and maintaining public trust.
By Jennifer J. Daniels and David J. Oberly, Blank Rome | May 13, 2019
Companies can expect to continue to encounter a similar, steady—if not increasing—steam of phishing attacks specifically targeting business entities for the foreseeable future. As such, now is the time for companies to ramp up their employee phishing education and training regimens.
By Ilia Sotnikov, Netwrix | May 10, 2019
IP theft is not limited to kingpins of business. Even if your organization has never appeared in the headlines, you cannot rest easy that no one is interested in acquiring your know-how.
By Debra Farber, BigID | May 9, 2019
Because of the act's broad-reaching provisions, confusion exists regarding many of the details, with much of it rooted in a foundational provision: what constitutes personal information (PI) and how that differs from personally identifiable information (PII).
Presented by BigVoodoo
This conference aims to help insurers and litigators better manage complex claims and litigation.
Recognizing innovation in the legal technology sector for working on precedent-setting, game-changing projects and initiatives.
Legalweek New York explores Business and Regulatory Trends, Technology and Talent drivers impacting law firms.
Search for the President and Dean California Western School of Law San Diego, California California Western School of Law (California ...
Duane Morris LLP has an opening for an associate with 2-3 years of experience with strong capital markets and corporate transactional backgr...
Our client, an established provider of professional liability insurance, has engaged us to identify a highly-qualified Senior Bad Faith Tria...