Discovery Attender as an investigative tool

A common Discovery Attender question is whether or not it works as ”investigation software.”   While the most common deployment for this application is assisting electronic discovery (litigation) or answering FOIA requests, Sherpa Software has a number of customers who use … Read More

Understanding HIPAA

Here at Sherpa, we’re frequently contacted by organizations looking to learn more about complying with federal regulations, such as HIPAA or Sarbanes-Oxley. HIPAA, the Health Insurance Portability and Accountability Act, was enacted in 1996 to ensure the protection of patient … Read More

The Evolution of the Electronic Information Lifecycle

Information does not appear in a vacuum. It can and does take on a life all its own, which needs to be managed accordingly.  Digital data, for example, can be created without notice – which can then expand and proliferate as … Read More

Risk assessment: It is worth the work!

Imagine that you are sitting on a tree stump in a quiet forest next to a gently running stream. The birds are chirping, squirrels and chipmunks playing, and all seems right with the world. You are in your refuge; the … Read More

From LotusScript to Java: An Introduction

Overview This is the first part in a series of blog posts that will be targeted to IBM Notes Developers. Specifically, for those who are proficient in LotusScript and who want to learn Java. The Reason for the Series The … Read More

(Re) Introduction to the Payment Card Industry Data Security Standard

Just in time for the New Year, authorities have announced that as many as 40 million debit and credit cards may have been compromised as a result of a breach of Target’s payment system. Details of how the theft occurred … Read More