Aug
30

Bring Your Own Device & Data Security

With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes. Rather than transporting duplicate devices to distinguish between professional vs. personal data, employees … Read More

Jun
08

Breach of Security: Measuring the Cost of Cyber Crime

Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as high as $1 trillion. The reason estimates vary is due in … Read More

Apr
12

How IT can meet the demands of eDiscovery & Policy Enforcement

A company’s email system is arguably the center of their corporate communications. Not only is it the centerpiece in the actual message content, but also as a mechanism for sharing files and documents that can be transmitted and retransmitted across … Read More

Jan
22

Predictive Coding

In my article on reducing eDiscovery costs in last month’s Sherpa newsletter, I made mention of an automated document review technique known as Predictive Coding. As discussed in the article, the primary expense involved in the eDiscovery process isn’t so … Read More

Jan
19

How to Reduce eDiscovery Costs

There’s no doubt that litigation is expensive. When the added expense of producing and reviewing electronically stored information (ESI) is added, the costs can become mind boggling. Case in point – In the highly publicized Apple Inc. v. Samsung Electronics … Read More

Dec
03

5 Steps to Take When You Receive A Corporate Policy Directive

Retention polices are the core of a strong Information Governance strategy. They are enacted for a variety of reasons, from complying with government regulations to creating a proactive and defensible litigation response plan. Below are five steps to think about … Read More