Mar
29

WHITE PAPER: An Introduction to PCI and PII: Securing Your Organization’s Data

Just about every day, the national headlines include stories about data breaches that have compromised the security of thousands or even millions of confidential electronic records, often containing credit card or social security numbers. Usually, this occurs at organizations found … Read More

Mar
23

The Results are in! eDiscovery 2016 Survey

A recent survey asked eDiscovery, Legal and IT professionals questions pertaining to their eDiscovery projects and needs. More than 250 industry professionals participated and shared their insights. As promised, we have compiled the data and created a detailed infographic to … Read More

Mar
16

Bridging the chasm between IT and Legal – (Part 2 of 2)

IT and Legal must work hand-in-hand in order to allow your organization to be profitable and successful. By developing a thorough plan and properly implementing the right tools, you can create a cohesive team. In Part 1 of this series, … Read More

Mar
08

Why bring eDiscovery in-house?

Traditional models of eDiscovery have involved collecting electronic files from email servers, file shares and other data repositories, then handing if off wholesale to outside vendors for culling, processing and review. With the advent of effective in-house software and solutions, … Read More

Feb
23

Deleting Data from a Device: Is it really gone?

We’ve all had to delete data from our devices, whether the plan was to sell or just dispose of them.  Of course, we try to remove all confidential information, pictures, emails and files so that they cannot be accessed by … Read More

Feb
16

Bridging the chasm between IT and Legal (Part 1 of 2)

In today’s litigious world of business, one of the most important relationships is between IT and Legal. These two departments must be in sync for any eDiscovery and/or policy management process to be successful. Both are necessary players and the … Read More