The Relativity Blog


Your single source for new lessons on e-discovery and the technology that powers it.

therelativityblog.com

e-Discovery Star Wars, Episode I: 3 Ways to Secure an Empire

2017-03-28+0000| | In-house Counsel, Law Firm, Cybersecurity & Data Privacy, Litigation Support

120916-rogue-one.pngIt’s here. The next film in the Star Wars universe—Rogue One: A Star Wars Story—is on the verge of release. This post won’t contain spoilers, but previews have announced that Rogue One will set the stage for the original Star Wars film (Episode IV: A New Hope), following a band of rebels whose mission is to steal the secret plans for the Death Star.

There are many opportunities to find connections between Star Wars and e-discovery. In fact, Princess Leia is originally introduced as a “custodian” of stolen plans, and the first words spoken to Darth Vader on screen describe a digital forensics investigation: “The Death Star plans are not in the main computer.”

Read More »

Processing 102: Communicating with Collection and Review Teams

2017-03-28+0000| | Processing, Litigation Support

120716-processing-workflow.pngOne of the key components to a successful e-discovery project is proper communication across the different teams responsible for its many stages. Often we refer to this as working “end to end” on the EDRM. From legal hold and collection requests to the format of production and each step in between, teams must collaborate to ensure success.  

If you manage processing jobs, your work is the link between the left-hand side of the EDRM and the right—those who gather the data, and those who analyze it.

Read More »

As with Holiday Cookies, e-Discovery Calls for Trusted Recipes

2017-03-28+0000| | Education & Certification, Law Firm, Litigation Support

120616-proj-mgmt-community.pngAs we nestle further into December, we mull over what to bring for the office cookie exchange, looking to our favorite recipes for the steps needed to yield a delicious result. Spontaneous creativity has its place in the world (if Top Chef is wrong, we don’t want to be right), but certain ventures benefit from a structured sequence.

Alas, as any baker who’s experienced a Pinterest fail can tell you, simply “beginning with the end in mind” isn’t always enough. Having a tactical roadmap can make all the difference. What about in the world of e-discovery?

Read More »

Is Your Organization Vulnerable to a Cyber Attack? 3 Steps to Put Your Mind at Ease

2017-03-28+0000| | In-house Counsel, Cybersecurity & Data Privacy

120116-cybersecurity-fest.pngWhen PwC’s Doug Bloom and Anthony Moeller convened at Relativity Fest in October for their session e-Discovery in Cyber Investigations, they didn’t mince words. Cybercrime might be old news, but preventing it from happening hasn’t gotten any easier.

Ideally, any kind of breach is going to be prevented—but that perfect world doesn’t exist,” said Anthony. “Most companies have been hacked or will be hacked.”

Not exactly an uplifting message, but all hope is not lost. Throughout the session, Anthony and Doug focused on a few ways you can mitigate the risks of experiencing these attacks.

Read More »

5 Unique Challenges of Second Requests

2017-03-28+0000| | Review & Production, Analytics & Assisted Review, In-house Counsel, Law Firm

160513_FRONTEO_logo_H_RGB_Color.pngThis article was originally published on the FRONTEO Blog. It's an informative look at what sets second requests apart from other types of e-discovery projects. Check out the original version here.

Under the Hart-Scott-Rodino Antitrust Improvements Act, both parties involved in a transaction must file a “Notification and Report Form” with the Federal Trade Commission (FTC) and the Antitrust Division to obtain approval for before mergers, tender offers, or other acquisition transactions.

After review of the original notification documents, the FTC or the Antitrust Division may request more information in the form of a “Request for Additional Information and Documentary Materials,” more commonly referred to as a “Second Request.”

Read More »

Three Lessons on Digital Threats (and 4 Bonus Tips from a New IG Playbook)

2017-03-28+0000| | Information Governance, In-house Counsel, Cybersecurity & Data Privacy

112916-ig-playbook.pngWhat are the common gateways to cyberattacks? What are the risks associated with the Internet of Things (IoT)? What steps can an organization take to address personal cloud applications and other digital age threats?

These were just a few of the key questions that a panel of legal technology experts considered during the Relativity Fest 2016 session entitled The New IG Playbook for Addressing Threats from Personal Clouds, Cyber Attacks, and the IoT. Joining me for the discussion were Judy Selby, managing director of technology advisory services for BDO Consulting; Darin Sands, who chairs the Privacy and Data Security and eDiscovery Practice Groups at Lane Powell PC; and Donald Billings, manager of litigation and practice support at Sidley Austin.

Read More »

Holiday Gatherings: How to Make Them All About e-Discovery (and You)

2017-03-28+0000| | Community

112816-holiday-dinner-xmas-02.pngLast year, you seemed a little reluctant to talk about your job with family during the holidays. It can be hard work to describe the work we do in e-discovery, after all.

That was then; this is now. It’s a time of an unprecedented number of precedents for mainstream interest in e-discovery. It’s a holiday season on the heels of one of the most globally sensitive and divisive US elections in history, when avoiding political topics at the table is more tempting than ever. This year, the intersection of law and technology is your dinner conversation destination.

Read More »

An Agile Law Firm? It Exists, and It’s Getting Results

2017-03-28+0000| | Education & Certification, Law Firm

111816-agile-law-firm.pngDuring our recent webinar “9 Habits of Resilient Information Leaders,” panelists revealed that one of the top habits is to “stay agile”—practicing the Agile methodology’s tenets of failing fast and iterating quickly.

Software companies have been using the Agile mindset for over a decade, and other disciplines have followed suit. But does the Agile movement—which emphasizes iterative work, faster timelines, and more adaptable project planning—have legs in the legal industry? At kCura, we’re big believers in Agile development—and it seems like a strong fit for e-discovery services, too, given the emphasis on flexible responses to rapid change and purposeful project management.

Read More »

e-Discovery Fishing Expeditions and the Mick Jagger Discovery Doctrine

2017-03-28+0000| | Legal Update, Law Firm

111716-mick-jagger-discovery-doctrine.pngDefinition of Discovery:

The pre-trial devices that can be used by one party to obtain facts and information about the case from another party in order to assist the party’s preparation for trial.

See also: Deposition; Fishing trip or expedition

—Black’s Law Dictionary (6th Ed.)

Although the editors of Black’s Law Dictionary have been more diplomatic in subsequent versions by deleting the reference to discovery being a fishing expedition, lawyers and their responding party clients have complained for years that many e-discovery requests amount to just that.

Read More »

Combating Global Corruption: Lessons from the ‘Jason Bournes’ of e-Discovery

2017-03-28+0000| | Analytics & Assisted Review, In-house Counsel, ECA & Investigation

111516-investigations-panel.pngWhen many hear words like “fraud,” “bribery,” and “corruption,” they imagine investigators traveling the globe, searching for clues to solve a corporate scandal, and ultimately putting the bad guy behind bars. But what is it actually like to investigate these crimes?

From the Panama Papers to the FIFA scandal, we’ve seen technology become imperative when investigating corruption across the globe. Here’s what attendees learned from a Relativity Fest panel, moderated by Control Risks principal David Deusner, and featuring Hogan Lovells litigation project manager Jeremy Burdge, as well as Control Risks partner Terry Chopiuk, director Mason Pan, and principal Daniel Rudder.

Read More »
 

Get the Relativity Blog

Get The Relativity Blog

About the Blog

The Relativity Blog provides engaging e-discovery and legal technology lessons to a diverse audience of practitioners. Written by the team behind Relativity and the community that drives this industry, the blog is your go-to source for tangible takeaways, thought-provoking discussion, and expert insights into stories and technologies that can help you improve your day-to-day work.

Share Your Expertise

Want to be an author on The Relativity Blog? We’re always happy to feature readers.

Learn More