Mar
08

Why bring eDiscovery in-house?

Traditional models of eDiscovery have involved collecting electronic files from email servers, file shares and other data repositories, then handing if off wholesale to outside vendors for culling, processing and review. With the advent of effective in-house software and solutions, … Read More

Feb
23

Deleting Data from a Device: Is it really gone?

We’ve all had to delete data from our devices, whether the plan was to sell or just dispose of them.  Of course, we try to remove all confidential information, pictures, emails and files so that they cannot be accessed by … Read More

Feb
16

Bridging the chasm between IT and Legal (Part 1 of 2)

In today’s litigious world of business, one of the most important relationships is between IT and Legal. These two departments must be in sync for any eDiscovery and/or policy management process to be successful. Both are necessary players and the … Read More

Feb
02

A Rose by Any Other Name:  It’s All Information Governance

Many articles focused around information governance (IG) discuss the framework in terms of data collections, legal holds, and other eDiscovery related tasks. By limiting IG to a specific eDiscovery focus however, these commentaries lose the full strategic scope of what … Read More

Altitude IG Updates for January

The new Altitude IG updates for January are being released at the end of the month.  The update includes several new legal hold notification features: Automated re-sending of the hold notice if the custodian has not acknowledged the hold within … Read More

Are eDiscovery policies a part of your Risk Management Plan?

Electronic discovery (also called e-discovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. Discovery of electronic records has become … Read More