Just as there are many tasks in electronic discovery, many times there are multiple technologies and platforms involved in the complete electronic discovery process. When there are multiple technologies and platforms involved, data must be transferred from disparate technologies and platforms to other disparate technologies and platforms. This data transfer can be considered a risk factor that impacts the overall electronic discovery process.
“With the acquisition of Hotify, Sonasoft is poised to be a disruptive competitor in the industry,” said Andy Khanna, Vice Chairman of Sonasoft, who is in charge of mergers, acquisitions, and compliance matters. “Hotify has proven AI technology, and that is why we pursued this acquisition. When combined with Sonasoft’s client and partner portfolio along with our strong sales and marketing engine, we have an incredible opportunity for success. Our existing IP in data archiving and eDiscovery is an initial launching point to fully integrate Hotify’s AI.”
Law firms increasingly are turning toward high-risk, high-reward venture capital investing as a way to spur technology innovations to streamline functions like contract review and legal research. Yet the investments are raising conflicts-related concerns among legal ethics experts and competing firms that have rejected the approach.
Knox Capital Operating Partner Mike Bryant presents a short, eight-minute TED-style talk on investments and investing in the legal tech market during SOLID West on February 28, 2019, in San Francisco. SOLID, also known as the Summit on Legal Innovation and Disruption, is a TED talk-style summit focused on innovation and the business of law.
While the percentage of transactions in which a Second Request was issued by either the FTC or DOJ was only 2.7% in 2015, 3.0% in 2016, and 2.6% in 2017, organizations engaged in merger and acquisition activities, either directly from a participatory position or indirectly from a supporting position, should proactively prepare to support the potential for a Second Request given the short deadlines and potential voluminous information requests that may require extensive use of data discovery and electronic discovery technologies and experts to ensure compliance with requests.
Contextual analysis technology is still in early adoption stages among many Fortune 500 companies. With this advanced technology, companies have the ability to pinpoint behavioral red flags and be empowered to more effectively identify, manage, and mitigate “bad behavior” before it escalates.
The Cloud Security Alliance (CSA) today announced the release of the CSA IoT Controls Framework, its first such framework for IoT which introduces the base-level security controls required to mitigate many of the risks associated with an IoT system operating in a range of threat environments.
A Nearest Neighbor Search is perhaps the simplest procedure you might conceive of if presented with a machine-learning-type problem while under the influence of some sort of generalized “veil of ignorance”. Though there exist slightly more complicated variations in the algorithm, the basic principle of all of them is effectively the same.
The Predictive Coding Technologies and Protocols Survey is a non-scientific survey designed to help provide a general understanding of the use of predictive coding technologies, protocols, and workflows by data discovery and legal discovery professionals within the eDiscovery ecosystem.
Gaslighting is a sophisticated manipulation tactic which certain types of personalities use to create doubt in the minds of others. Recognizing and appropriately responding to it can be critical to reducing its impact in environments ranging from the courtroom to the c-suite. If not dealt with properly, gaslighting can have a negative impact on relationships, performance, and communications, directly impacting organizational and individual productivity, revenue, and outcomes.