By Byron SpiceMessage That Grabs Attention: “Your Location Has Been Shared 5,398 Times”Many smartphone users know that free apps sometimes share private information with third parties, but few, if any, are aware of how frequently this occurs. An experiment at Carnegie Mellon University shows that when people learn exactly how many times these apps share that information they rapidly act to limit further sharing.In one phase of a study that evaluated the benefits of app permission managers – software that gives people control over what sensitive information their apps can access – 23 smartphone users received a daily message, or “privacy nudge,” telling them how many times information such as location, contact lists or phone call logs had been shared.
News, views, discussions and data associated with the field of electronic discovery.
Information Governance (InfoGovernance) is the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archiving and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information to enable an organization to achieve its goals. Information governance should be an element in planning an enterprise's information architecture.
(Gartner Hype Cycle for Legal and Regulatory Information Governance, 2009, December 2009).
An Engagement Area (EA) is an area where the commander of a military force intends to contain and destroy an enemy force with the massed effects of all available weapons systems.
(FM 1-02, Operational Terms and Graphics, September 2004).
Friday, March 27, 2015
Study Shows People Act To Protect Privacy When Told How Often Phone Apps Share Personal Information
Thursday, March 26, 2015
Too Many Notes: In re: Lithium Ion Batteries Antitrust Litigation
By Craig BallThe core challenge of discovery is identifying information that is responsive but not privileged, achieved without undue burden or expense. There are multiple ways to approach the task, none optimal. The most labor-intensive method is called “linear human review,” where lawyers (for the most part) look at everything and cull responsive and privileged items. It sufficed in the pre-digital era when much effort and resources were devoted to recordkeeping. Despite being costly, slow and error prone, linear review was all we had, so became the gold standard for identifying responsive and privileged information.
Wednesday, March 25, 2015
Frivolous Law Suits? 26+ Reasons to Laugh at eDiscovery (Cartoon and Clip)
The Cartoon and Clip of the Week for March 25, 2015
The Humor of eDiscovery: 26 Cartoons and Clips
Monday, March 23, 2015
Do smart machines require ethical programming?
From Help Net SecurityRealizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well they maintain that trust. Central to establishing this trust will be ethical values that people recognize and are comfortable with. “Clearly, people must trust smart machines if they are to accept and use them,” said Frank Buytendijk, research vice president and distinguished analyst at Gartner. “The ability to earn trust must be part of any plan to implement artificial intelligence (AI) or smart machines, and will be an important selling point when marketing this technology. CIOs must be able to monitor smart machine technology for unintended consequences of public use and respond immediately, embracing unforeseen positive outcomes and countering undesirable ones.”
A Look Back: NetDiligence 2014 Cyber Claims Study
From Traub Lieberman Straus & ShrewsberryThe NetDiligence 2014 Cyber Claims Study relies on data voluntarily provided by insurers about amounts paid out on cyber claims occurring from 2011 through 2013. Since the Study only accounts cyber claims reported to larger insurers, NetDiligence believes its study only accounts for 5-10% of the total number of all cyber claims handled in those years.Among the highlights, the Study found that the predominant type of information exposed in any cyber claim remains personally identifiable information (“PII”). Under a definition of PII expanded to include email addresses and passwords, 97% of the information exposed constitutes PII. The remaining data exposed included protected health information (“PHI”) under HIPPA and payment card information (“PCI”).
Friday, March 20, 2015
Ending the Debate on TAR Seed Sets
By Hal MarcusIn the wake of Judge Peck’s recent Rio Tinto opinion on technology assisted review, the ediscovery blogosphere has been repeatedly quoting its bold pronouncements that judicial acceptance of TAR “is now black letter law” and that “it is inappropriate to hold TAR to a higher standard than keywords or manual review.” And rightly so — these statements appear intended to put outdated predictive coding debates to rest once and for all. Yet a good deal of the focus is going to the question Judge Peck raises but does not fully resolve: whether disclosure of TAR seed sets may be required.
‘Have you Taken Leave of Your Senses?': Top 10 Takeaways from 2015 LegalTech Judges Panel
By Tamara EmoryAt this year’s Legal Tech, I once again had the honor of moderating the Judges Panel, on which Judge John Facciola (D.D.C., retired), Judge Andrew Peck (S.D.N.Y), Judge Frank Maas (S.D.N.Y), and Judge Elizabeth Laporte (N.D.Cal.) presented. This time, we had a provocative topic (or, perhaps –as Judge Peck put it–, a depressing one): “What’s Wrong with Discovery?” The judges had plenty of insight into why discovery has become risky and expensive, what causes attorney misconduct in discovery, and implications for access to justice. Below are ten highlights of that discussion.
Tuesday, March 17, 2015
2015 Big Data and Analytics Survey
By IDG EnterpriseThe 2015 Big Data and Analytics study highlights data-driven initiatives and strategies driving data investments within IT organizations. In order to gain a deeper understanding of organizations’ big data goals and tactics, the research shows data deployment trends, future investment growth and opportunities for vendors.
Wednesday, March 11, 2015
Elephants, Review, and Marilyn Monroe Wallpaper: Why eDiscovery Review is so Inconsistent
By Herbert L. RoitblatOne advantage of using computer assisted review, for example, predictive coding, is that the computer does, in fact, examine all of the available evidence in a document. Unlike human reviewers, the computer sees all parts of the elephant and, as a result, consistently judges documents based on the full complement of information in them. Each of reviewer judgment used to train the system may be based on a sample of features, but the computer system aggregates all of these partial judgments and chooses the category that is most consistent with this aggregation of cues, rather than with any individual sample. As a result, the computer can be more consistent than the human reviewer who trains trains it. Under appropriate circumstances, this consistency further enhances the accuracy and reliability of computer assisted review.
A Short List of eDiscovery Investors
Tuesday, March 10, 2015
The eDisclosure Systems Buyers Guide – 2015 Edition
The eDisclosure Systems – Buyers Guide – 2015 Edition
- Authored by Andrew Haslam, Allvision Computing.
- Prepared in Conjunction with LegalIT Insider.
The Cost of Email: Metrics and Mentions (Cartoon and Clip)
The Cartoon and Clip of the Week for March 11, 2015
Managing Email? Four Mentions of Interest
Predictive Coding – what happened to the next big thing?
In 2010, “predictive coding” or “computer-assisted review” was considered the next big thing in ediscovery, destined to replace linear review and keyword searching as the predominant methodology during document review. Fast forward 5 years and where are we? Has the “next big thing” arrived? Predictive coding, which uses computer algorithms to determine which documents are most likely to be relevant based on a sample set of documents reviewed by a subject matter expert (i.e. lawyers), can result in substantial cost savings. It can be used to cull the volume of documents to be reviewed or prioritise […]
Sunday, March 8, 2015
A Short List of Public Companies with eDiscovery-releated Offerings
Provided below is a short list of 20+ publicly traded companies that offer eDiscovery-related offerings as part of their overall offering portfolio.
- Barracuda Networks (C2C Systems)
- CommVault
- Daegis
- EMC
- Epiq Systems
- Guidance Software
- HP – Autonomy
- Huron Consulting (Huron Legal)
- IBM (StoredIQ)
- KOFAX
- LexisNexis (Reed Elsevier)
- Microsoft (Equivio)
- Navigant Consulting
- OpenText
- PwC
- Rand Worldwide
- Ricoh
- Symantec
- Thomson Reuters
- UBIC
- Walters Kluwer – ELM Solutions
- Xerox Litigation Services
Thursday, March 5, 2015
Judge Peck’s Latest: TAR Now ‘Black Letter Law’; CAL Reduces Significance of Seed Set
In an opinion released yesterday, Judge Peck says that, in the years since Da Silva Moore, “the case law has developed to the point that it is now black letter law that where the producing party wants to utilize TAR for document review, courts will permit it.”The opinion was issued in the case Rio Tinto PLC v. Vale SA, Case 1:14-cv-03042-RMB-AJP (S.D. N.Y. March 3, 2015). The issue before Judge Peck was approval of the parties’ stipulated TAR protocol. But Judge Peck took the opportunity to address several issues of broader interest to the e-discovery community about TAR cases and protocols.
A Short List of eDiscovery-releated Providers on the 2015 KMWorld 100 List
Provided below is a short list of sixteen technology/service providers that are highlighted on both the recently published “100 Companies That Matter in Knowledge Management” listing from KMWorld and on the running “Top 100+Provider” list from ComplexDiscovery.
- AccessData
- BrainSpace
- Concept Searching
- Content Analyst
- EMC
- FTI Technology
- HP
- IBM
- iCONECT
- kCura
- KOFAX
- Microsoft (Equivio)
- Nexidia
- OpenText
- Recommind
- RSD
Big Data’s Holy Grail: Analyzing Your Facebook Posts
By Peter BarlasA few of the largest and oldest tech firms may finally get a shot at beating the upstarts in the fast-growing data analytics software market. Hewlett-Packard (NYSE: HPQ ), Oracle (NYSE: ORCL ) and others are armed with software to tackle what is becoming a growing concern and a big pain for companies: how to derive useful information from the reams of social media conversations, e-mail and other unstructured data on the Internet.
Wednesday, March 4, 2015
Breaking News: Judge Peck Does It Again, Issues New Predictive Coding Case
By Philip FavroHe’s done it again. U.S. Magistrate Judge Andrew Peck is at the center of the eDiscovery universe with a new opinion touching on some questions surrounding the use of predictive coding in litigation. On March 2, 2015, Judge Peck issued Rio Tinto Plc v. Vale S.A., approving the parties’ stipulation to use predictive coding in discovery. In connection with his order, Judge Peck offers guidance on the use of predictive coding “because of the interest within the ediscovery community about TAR cases and protocols.”Most of Rio Tinto is dedicated to discussing the merits of transparency and cooperation in developing predictive coding seed sets. As Judge Peck observes, this issue remains open and there is no definitive answer on the extent of transparency and cooperation required in connection with seed set.
New Video on Best Practices: Protecting Privilege
Lexbe provides eDiscovery software and services for legal professionals at law firms, corporations, and government agencies.
Tuesday, March 3, 2015
Prioritizing Information Security? A Reason and Resource (Cartoon and Clip)
Actionable InfoSec Intelligence from Threat Brief
Monday, March 2, 2015
Ralph Losey: My Hack of the NSA and Discovery of an Unknown Plan to Use Teams of AI-Enhanced Lawyers and Search Experts to Find Critical Evidence
By Ralph LoseyThe Plan for AI-Enhanced search and review is in the form of a detailed 1,500 word outline. It looks like this Plan is commonly used in the future to obtain client and insurer approval of e-discovery review projects. I think that this review Plan of the future is part of a standardized approval process that is eventually set up for client protection. Obviously we have nothing like that now. The plan might even be shared with opposing counsel and the courts, but I cannot be sure of that. I had to make a quick exit from the NSA system before my intrusion was detected.
Sunday, March 1, 2015
Here’s Why People Trust Human Judgment Over Algorithms
New Webinar – Mitigating the Threat: Lessons Learned from Sony
• Lessons learned from 2014 breaches
• Improving cyber situational awareness across the organization
• Executing an incident response plan
• How SRC uses the Cybersecurity Framework to prevent such attacks
Relevant Replay: We Have Met the Enemy and He Is PowerPoint
By Elisabeth Bumiller“PowerPoint makes us stupid,” Gen. James N. Mattis of the Marine Corps, the Joint Forces commander, said this month at a military conference in North Carolina. (He spoke without PowerPoint.) Brig. Gen. H. R. McMaster, who banned PowerPoint presentations when he led the successful effort to secure the northern Iraqi city of Tal Afar in 2005, followed up at the same conference by likening PowerPoint to an internal threat.