Information Governance (InfoGovernance) is the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archiving and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information to enable an organization to achieve its goals. Information governance should be an element in planning an enterprise's information architecture.

(Gartner Hype Cycle for Legal and Regulatory Information Governance, 2009, December 2009).

An Engagement Area (EA) is an area where the commander of a military force intends to contain and destroy an enemy force with the massed effects of all available weapons systems.

(FM 1-02, Operational Terms and Graphics, September 2004).

Friday, December 12, 2014

eDiscovery Vendor Viability: Comparisons Beyond Technology and Talent

By Rob Robinson
In an effort to help eDiscovery decision makers evaluate and compare both the immediate and long term success potential of electronic discovery vendors, the following considerations, shared in a formulaic manner to allow for objective comparison of subjective evaluation criteria, are provided for your review.  The author is well aware that there are many considerations required to truly evaluate electronic discovery vendors and the following  considerations represent one view of how one can evaluate/compare vendors beyond just the “feature and function and pricing” of services and products.

Thursday, December 11, 2014

The Impact Of Privacy Liability (Cartoon and Clip)

The Cartoon and Clip of the Week for December 10, 2014

Daily we read, see and hear more and more about the challenges associated with privacy regulation and liability. This week’s cartoon and clip highlights one public example of holiday related privacy violations (cartoon) and provides a link to an article on the increasing involvement of federal regulatory agencies in applying privacy law (clip).


IdentityTheft-590

Safe & Sound: A Privacy and Security Blog

Click here to find the latest privacy and security advice for companies from the Safe & Sound Privacy and Security Blog of Quarles and Brady.

Wednesday, December 10, 2014

Got the ECM “Bends”? Head About to Explode?

By John Martin
ECM users sometimes have the Info Gov equivalent of the deep sea diving “bends” that occur when divers ascend too quickly after deep dives and the gas that had been compressed in their bodies decompresses causing painful and sometimes fatal injuries. ECM users sometimes feel like their heads are about to explode after trying to sift through all the irrelevant and redundant documents in their systems. If you or your users are repeatedly experiencing the ECM bends, it’s a sure sign that it’s time to weed out the irrelevant documents and the redundant copies of relevant content that are cluttering you system.

Tuesday, December 9, 2014

ILTA 2014 Law Firm Tech Survey – Highlights

By Ron Friedmann
The  ILTA 2014 Law Firm Tech Survey was just released. The International Legal Technology Association each year conducts a comprehensive survey of law firm technology. At 301 pages, the report is packed with information. I summarize here findings on practice support and the business of law that I find interesting; I also offer some comments. This survey is a Herculean effort and we should all applaud ILTA and the many volunteers and participants who make it possible. Social Networking and Collaboration Tools  (p. 61). The results here disappoint but do not surprise. Much of Big Law had great hope for consumer-style social media re-tooled for […]

Monday, December 8, 2014

Measuring Recall in E-Discovery Review, Part Two: No Easy Answers

By John Tredennick
In Part One of this two-part post, I introduced readers to statistical problems inherent in proving the level of recall reached in a Technology Assisted Review (TAR) project. Specifically, I showed that the confidence intervals around an asserted recall percentage could be sufficiently large with typical sample sizes as to undercut the basic assertion used to justify your TAR cutoff.
In this Part Two, I will take a look at some of the other approaches people have put forward and see how they match up. However, as Maura Grossman and Gordon Cormack warned in “Comments on ‘The Implications of Rule 26(g) on the Use of Technology-Assisted Review’” and Bill Dimm amplified in a later post on the subject, there is no free lunch.

No Export License Required for Software as a Service

By Thomas M. DeButts
The US Department of Commerce, Bureau of Industry and Security (BIS) recently released a redacted Advisory Opinion dated November 13, 2014 that confirms for cloud-based software vendors (or Software as a Service providers) that allowing access to export controlled software for use only in the cloud (or on servers) does not constitute an export of that software to the user. This completes the picture of how SaaS providers can legally deliver cloud-based computing and storage services to parties outside the borders of the country where the servers are located without triggering export authorization requirements. […]

Saturday, December 6, 2014

The Continued Decline of the Homepage

By Gerry McGovern
Google is your new homepage. Every page you have is a homepage for someone. We must think beyond the traditional homepage. “The value of the homepage is decreasing,” a leaked New York Times report stated in May 2014. “Only a third of our readers ever visit it. And those who do visit are spending less time: page views and minutes spent per reader dropped by double-digit percentages last year.” “Across The Atlantic sites, the fraction of visits that begin on the homepage is surprisingly small,” Bob Cohn, editor of Atlantic Digital wrote in 2012. “About 13 percent of visits […]