Automating Quality Control: Illustrating Business Intelligence in Action

Production deliverables for eDiscovery are complex assemblages of elements that may include hundreds of thousands of native files, image files, text files, load files, and a variety of customizations. A wide range of simple technical issues are possible, including file naming errors, load file field errors, file linking errors, imaging and endorsement errors, and more. Every error costs time and money to catch and fix, both of which are typically in short supply near the end of an eDiscovery project.

Read more

Capability Maturity and Continuous Improvement

A continuous improvement process (or continual improvement process, if you’re particular) is a process (or plan or program) by which subject activities are continually, iteratively improved over time by making them incrementally faster, cheaper, or more effective whenever opportunities to do so are identified.

Read more

Tracking Metrics Across Projects

A discussion of applying business intelligence concepts to eDiscovery project and program management to extract knowledge and value from discovery project data for the benefit of individual projects, overall programs, and your whole organization

Read more

The “Snooper’s Charter” (Investigatory Powers Act) Gets Royal Assent in the UK

The Queen granted The Investigatory Powers Act 2016, nicknamed the “Snooper’s Charter,” the Royal Assent on 29 November 2016, after it had been signed by both Houses of Parliament. The bill came into force at the beginning of 2017. The Act is in part a reaction to the Snowden revelations of the scale of bulk interception conducted by GCHQ.

Read more

Tracking Metrics for Fun and Profit

Every eDiscovery practitioner has experienced the reactive urgency of a sudden and overwhelming discovery project. Indeed, many spend long periods of time buffeted from one to the next. Projects can be completed this way, obligations met, but often only at great cost and with great effort. And, so, every eDiscovery practitioner has also felt the desire for more control, more insight, more efficiency.

Read more

ECA Sampling Hypothetical

In the first Part of this short series, we reviewed the concept of sampling and its role and potential benefits during early case assessment (ECA). In the second Part, we reviewed the key concepts you need to understand to use sampling for the estimation of prevalence. In this final Part, we review a hypothetical application of those concepts to see what we can learn.

Read more

Making a NIST List and Checking It Twice

This entry in our ongoing Core Skills Series is on the topic of de-NISTing and file type filtering. Despite the near-ubiquity of de-NISTing (and the commonality of supplemental file type filtering) during processing, many practitioners are unfamiliar with the specifics of what is being done to their data and how. This post reviews how de-NISTing works, common approaches to supplemental filtering, and some limitations to bear in mind.

Read more

California’s Final Four Technical Competency Requirements

In the first Part of this short series, we reviewed Comment 8 to ABA Model Rule 1.1, its adoption by twenty-five states so far, and a few state-specific variations on its technical competency requirement. In the second Part, we reviewed the first five of the nine specific technical competency requirements articulated by the California Bar. In this final Part, we review the four remaining California Bar requirements.

Read more

Blockchain Buzz

A new buzzword crept into the legal industry in 2016 (and is sure to be inescapable in 2017): “blockchain.” Blockchain first entered the public lexicon with bitcoin, but recently, it has started showing up in our industry media and being tried for various financial, legal, and security applications.

Read more

What’s Next for the Privacy Shield?

In Part 1, we reviewed the Safe Harbor program, its demise, and the creation of the new Privacy Shield replacement program. In Part 2, we reviewed the Privacy Shield program and the key differences between it and the Safe Harbor Program. In this final Part, we review some challenges already looming for the Safe Harbor Program and some changes coming in 2018.

Read more

News Menu

  • News Categories
    • Contact

      Contact Us

    • Approved Infrastructure