Subscribe to our blog

How does “Case Strategy” impact data collection in e-Discovery?

Data Collection – the first step in an eDiscovery project is usually underrated by the end-to-end managing team. The reason for this is because the data collection piece is often considered to be an “IT team only” task. However, we believe the time has now come for the core discovery people and lawyers to look into the collection process more keenly, because… a stitch in time, saves nin(...)

CPRA (California Privacy Rights Act): An expansion to CCPA

It’s not even a decade or half, but just 15 months back, the Californian Government enforced a data protection regulation named CCPA (California Consumer Privacy Act). With a pleasant surprise (might be a dismal surprise for organizations!), another Act was announced recently named CPRA (California Privacy Rights Act). Data Privacy Peers see the new regulation as an extension to CCPA, or you (...)

5 Undeniable Facts About eDiscovery

eDiscovery is one of the most intriguing topics of discussion when examining the use of technology by the legal profession. It is clear that the act of finding and collecting potentially relevant evidence has morphed into a massive operation that involves large amounts of money, time, and other resources. eDiscovery never fails to surprise and has constantly challenged legal professionals as ne(...)

What are the must-have technologies for arbitration?

Once COVID-19 has been declared a worldwide pandemic by World Health Organization (WHO), then the business of law came to a halt as the rest of the world. Many organizations, governments, and industries have to experience the impact of this global pandemic. Arbitration is one of the most acceptable means of dispute resolution internationally. Enterprises, arbitrators, outside counsels, and in-h(...)

Information Rights Management (IRM): What enterprises want!

Enterprises started showing more interest in data-centric security platforms in the recent past. The growing use of email platforms and enterprise collaboration systems required an encryption-based environment that defines permissions for different users and user groups. Access rights (i.e. view, edit, download, print, copy, and forward) could be controlled with next-generation IRM-enabled colla(...)
1 2 3 7