Have You Tried Using a ‘Nearest Neighbor Search’?
A Nearest Neighbor Search is perhaps the simplest procedure you might conceive of if presented with a machine-learning-type problem while under the influence of some sort of generalized "veil of ignorance".…
Actively Learning? Predictive Coding Technologies and Protocols Survey – Spring 2019 Results
The Predictive Coding Technologies and Protocols Survey is a non-scientific survey designed to help provide a general understanding of the use of predictive coding technologies, protocols, and workflows by data…
The Challenge of Mobile Security: New Cybersecurity Practice Guide from NIST
The NIST cybersecurity practice guide, Mobile Device Security: Cloud and Hybrid Builds, demonstrates how commercially available technologies can meet your organization’s needs to secure sensitive enterprise data accessed by and/or stored…
AI and Automation: From Removing Workers to Improving Quality
Just because a task can be automated doesn’t always mean that people will get replaced. In the 30 years after ATMs were introduced, the number of bank tellers increased slightly. Removing workers…
HIPAA, the HITECH Act, and Protected Health Information
It is important that all covered entities, business associates, and subcontractors dealing with PHI ensure that eDiscovery providers supporting them adhere to HIPAA and HITECH Act compliance requirements.
Five Great Reads on Data Discovery and Legal Discovery for February 2019
A selection of five articles shared regularly to inform and update legal and information technology professionals on the art and science of data discovery and legal discovery.
Desktop-as-a-Service and Access to eDiscovery Applications
The decentralization of eDiscovery workforces engaged in tasks ranging from on-site collections to remote reviews coupled with the desire of organizations to reduce investments in IT infrastructure and hardware is…
FTC Completes Review of CAN-SPAM Rule
The Federal Trade Commission announced on February 12, 2019, that it has completed its first review of the CAN-SPAM Rule, which establishes requirements for commercial e-mail messages and gives recipients…
Axiom Announces Application for IPO and Spin-Off of Two Businesses
Alternative legal services provider Axiom today announced it has submitted a draft registration statement with the Securities and Exchange Commission relating to the proposed initial public offering of its common…
Blockchains: The Unhackable Is Now Being Hacked
While blockchain technology has been long touted for its security, under certain conditions it can be quite vulnerable. Sometimes shoddy execution can be blamed, or unintentional software bugs. Other times…