2015 CTRL Survey on Data Analytics

The Information Governance Initiative (IGI) recently posted a survey on data analytics developed by the Coalition of Technology Resources for Lawyers (CTRL). As a sponsor of CTRL, we wanted to re-post this as a way of highlighting CTRL’s survey. While there has been a huge push around the use of advance analytics, the extent to…

Read More

The TAR Transparency Paradox

A central paradox has emerged from TAR case law: While litigants have the discretion to choose their own review methodologies, they may be expected to reveal those methodologies and have them scrutinized before they are even used. This, in turn, undermines their ability to exercise that very discretion.

Read More

Five Tactics for Winning eDiscovery Battles in Antitrust Wars

Today is Cinco de Mayo, a commemoration of the Mexican army’s historic victory over France at the Battle of Puebla. In law, there are few battles as large and costly as antitrust matters where fines in the billions aren’t uncommon. And when the stakes are this high, legal analytics take on a prominent role in effective…

Read More

So Many Words for Snow: Prioritized Review for Multiple Languages

It is a common linguistic myth that Eskimo languages have over 50 words for snow. It isn’t actually true, though. It’s just a myth. For those who like linguistics, the truth of the matter is that the variation in these languages is more structural than morphological. If you look at root words, there isn’t nearly…

Read More

The Sedona Conference WG1 2015 Midyear Meeting: Moving The Law Forward on eDiscovery

The eDiscovery universe continues to be roiled by disruptive trends that threaten counsel, clients, and the courts with unending challenges. The first quarter of 2015 alone has beset lawyers with eDiscovery problems stemming from: The interplay between mobile devices and cloud computing with traditional computer technology; Increased discovery from interconnected devices, applications, and technologies commonly…

Read More

Shoring Up Law Firm Data Security

The perils of inadequate data security practices have been splashed across the headlines throughout 2015, from the Sony computer network hack to the recent revelations on Hillary Clinton’s email practices. Given the increasing scrutiny on data security, it should not come as a surprise that companies are examining a previously overlooked link in the data…

Read More