There are many opportunities to find connections between Star Wars and e-discovery. In fact, Princess Leia is originally introduced as a “custodian” of stolen plans, and the first words spoken to Darth Vader on screen describe a digital forensics investigation: “The Death Star plans are not in the main computer.”
If you manage processing jobs, your work is the link between the left-hand side of the EDRM and the right—those who gather the data, and those who analyze it.
As we nestle further into December, we mull over what to bring for the office cookie exchange, looking to our favorite recipes for the steps needed to yield a delicious result. Spontaneous creativity has its place in the world (if Top Chef is wrong, we don’t want to be right), but certain ventures benefit from a structured sequence.
Alas, as any baker who’s experienced a Pinterest fail can tell you, simply “beginning with the end in mind” isn’t always enough. Having a tactical roadmap can make all the difference. What about in the world of e-discovery?
“Ideally, any kind of breach is going to be prevented—but that perfect world doesn’t exist,” said Anthony. “Most companies have been hacked or will be hacked.”
Not exactly an uplifting message, but all hope is not lost. Throughout the session, Anthony and Doug focused on a few ways you can mitigate the risks of experiencing these attacks.
Under the Hart-Scott-Rodino Antitrust Improvements Act, both parties involved in a transaction must file a “Notification and Report Form” with the Federal Trade Commission (FTC) and the Antitrust Division to obtain approval for before mergers, tender offers, or other acquisition transactions.
After review of the original notification documents, the FTC or the Antitrust Division may request more information in the form of a “Request for Additional Information and Documentary Materials,” more commonly referred to as a “Second Request.”
These were just a few of the key questions that a panel of legal technology experts considered during the Relativity Fest 2016 session entitled The New IG Playbook for Addressing Threats from Personal Clouds, Cyber Attacks, and the IoT. Joining me for the discussion were Judy Selby, managing director of technology advisory services for BDO Consulting; Darin Sands, who chairs the Privacy and Data Security and eDiscovery Practice Groups at Lane Powell PC; and Donald Billings, manager of litigation and practice support at Sidley Austin.
That was then; this is now. It’s a time of an unprecedented number of precedents for mainstream interest in e-discovery. It’s a holiday season on the heels of one of the most globally sensitive and divisive US elections in history, when avoiding political topics at the table is more tempting than ever. This year, the intersection of law and technology is your dinner conversation destination.
Software companies have been using the Agile mindset for over a decade, and other disciplines have followed suit. But does the Agile movement—which emphasizes iterative work, faster timelines, and more adaptable project planning—have legs in the legal industry? At kCura, we’re big believers in Agile development—and it seems like a strong fit for e-discovery services, too, given the emphasis on flexible responses to rapid change and purposeful project management.
The pre-trial devices that can be used by one party to obtain facts and information about the case from another party in order to assist the party’s preparation for trial.
See also: Deposition; Fishing trip or expedition
—Black’s Law Dictionary (6th Ed.)
Although the editors of Black’s Law Dictionary have been more diplomatic in subsequent versions by deleting the reference to discovery being a fishing expedition, lawyers and their responding party clients have complained for years that many e-discovery requests amount to just that.
From the Panama Papers to the FIFA scandal, we’ve seen technology become imperative when investigating corruption across the globe. Here’s what attendees learned from a Relativity Fest panel, moderated by Control Risks principal David Deusner, and featuring Hogan Lovells litigation project manager Jeremy Burdge, as well as Control Risks partner Terry Chopiuk, director Mason Pan, and principal Daniel Rudder.