Webinar: An Ounce of Prevention: Fundamentals of Data Protection For legal practitioners, a commitment to data protection is a matter of ethical duty, legal and regulatory compliance, and fundamental responsibility to clients and
Contract Abstraction Solution
Contract Abstraction Solution Distill complex legal agreements into actionable insights, facilitating efficient decision-making, mitigating risks, and maximizing opportunities Leverage proven solutions to enhance accuracy, reduce manual effort, and mitigate risks in
Webinar: Diversifying Legal Technology: Reimagining Talent Acquisition
Webinar: Diversifying Legal Technology: Reimagining Talent Acquisition It’s now proven that diverse teams of employees produce more creative, innovative, and effective outcomes. For organizations in the legal technology sector, success demands that
Advisory & Transformation Solutions
Advisory & Transformation Solutions Deliver on urgent, challenging, and opportunity-rich transformation initiatives with proven expertise on your side. Leverage world-class advisory expertise applied to your most pressing transformation initiatives Reduce implementation
Complete Security
Complete Security Delivering strength through trust Robust enterprise security framework to reduce risk, compliant with modern best-practices, and operating at global scale Coverage of all aspects of information security management, including
Immediate Case Assessment (ICA)
Immediate Case Assessment (ICA) Quickly identify the patterns or gaps in collected data, remove irrelevant information, and isolate hot documents in order to prioritize reviews for efficiency and work product quality.
Webinar: The Next Black Box: ChatGPT, LLMs, and Legal Technology
Webinar: The Next Black Box: ChatGPT, LLMs, and Legal Technology Generative AI applications like ChatGPT are suddenly everywhere, with companies announcing new integrations daily – including in the legal industry. But what is
Webinar: Off-Channel Communications: Strategies and Best Practices
Webinar: Off-Channel Communications: Strategies and Best Practices Never have there been so many communication devices, apps, and services available for use by employees, and employees helping themselves to these options can create
Webinar: No Maps for These Territories: The Uncertain Legal Future of Crypto
Webinar: No Maps for These Territories: The Uncertain Legal Future of Crypto The past year has been one of dramatic upheavals in countless areas, perhaps none more so than cryptocurrency and decentralized
Teach an Attorney to Phish: Lawyers’ Duties in a Digital World
Teach an Attorney to Phish: Lawyers' Duties in a Digital World The cyber landscape has never felt more like a wild frontier. Phishing attacks continue to rise, as do ransomware attacks and
Sampling Techniques for Litigation and Investigations
Despite years of discussion in the eDiscovery industry about the power and importance of sampling techniques – particularly in the context of technology-assisted review (TAR), many practitioners remain unfamiliar with what they can accomplish with them, and when, outside of TAR, they might do so.
Six Data Protection Strategies for Legal Teams: Mitigating Risk, Maintaining Reputation
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.
Webinar: Staying Safe in the Wildlands
Webinar: Staying Safe in the Wildlands The cyber landscape has never felt more like a wild frontier. Phishing attacks of all kinds continue to rise, as do ransomware attacks and other breaches, all
ED105 – Clearing the Fog of War: ECA Fundamentals
The fog of war is apt shorthand for the state of uncertainty that exists early in a new legal matter: What are the facts? What are the risks? What evidence exists, and what does it show? Early case assessment (ECA) is how we start to answer those questions.
ED104 – Time to Make the Donuts: Processing Fundamentals
The range of potential ESI sources is continually multiplying and diversifying. Processing is how we work with that diverse range of materials without using as many different pieces of software as there are types of sources and how we enable searching and document identification across different source types.
ED103 – The Grand Scavenger Hunt: Collection Fundamentals
With source types multiplying – including challenging sources like smartphones, social media, and collaboration tools, it is more important than ever for legal practitioners of all types to familiarize themselves with the fundamentals of collection so that they can assist in spotting potential issues and identifying appropriate solutions.
ED102 – In the Beginning: Identification and Preservation Fundamentals
Identification and preservation are the first and most fundamental phases of an electronic discovery effort. The duty of (identification and) preservation is a foundational concept in our legal system that grows out of the common law concept of “spoliation,” which is nearly 300 years old.
ED101 – The Evolving Duty of Technology Competence
In discovery specifically, and in legal practice generally, the role of electronically-stored information (ESI) and new technology has grown exponentially over the past decade, as new sources have proliferated, new tools have become normalized, and new communication channels have supplanted the old.
Cyber Response Solutions
Cyber Incident Response Control risks by promptly identifying and notifying individuals affected by a cyber incident Streamline incident investigation and notification processes with trusted expertise Solutions delivered for a fixed cost
Recovering Deleted WhatsApp Messages
Recovering Deleted WhatsApp Messages Introduction WhatsApp, the popular instant messaging system, was reported to be the most downloaded Android app in the world in 2018 with nearly 750 million downloads.