- NEW RSS FEED: http://feeds.feedburner.com/complexdiscovery/
- COMPLEXDISCOVERY on LinkedIn: http://bit.ly/ComplexDiscovery-LinkedIn
- COMPLEXDISCOVERY on Twitter: http://www.twitter.com/complexD
- COMPLEXDISCOVERY NEWSLETTER: Newsletter Subscription Link
InfoGovernance Engagement Area
News, views, discussions and data associated with the field of electronic discovery.
Information Governance (InfoGovernance) is the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archiving and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information to enable an organization to achieve its goals. Information governance should be an element in planning an enterprise's information architecture.
(Gartner Hype Cycle for Legal and Regulatory Information Governance, 2009, December 2009).
An Engagement Area (EA) is an area where the commander of a military force intends to contain and destroy an enemy force with the massed effects of all available weapons systems.
(FM 1-02, Operational Terms and Graphics, September 2004).
Wednesday, April 1, 2015
Consolidation of Blogs: New Location of Content on ComplexDiscovery.com
Friday, March 27, 2015
Study Shows People Act To Protect Privacy When Told How Often Phone Apps Share Personal Information
By Byron SpiceMessage That Grabs Attention: “Your Location Has Been Shared 5,398 Times”Many smartphone users know that free apps sometimes share private information with third parties, but few, if any, are aware of how frequently this occurs. An experiment at Carnegie Mellon University shows that when people learn exactly how many times these apps share that information they rapidly act to limit further sharing.In one phase of a study that evaluated the benefits of app permission managers – software that gives people control over what sensitive information their apps can access – 23 smartphone users received a daily message, or “privacy nudge,” telling them how many times information such as location, contact lists or phone call logs had been shared.
Thursday, March 26, 2015
Too Many Notes: In re: Lithium Ion Batteries Antitrust Litigation
By Craig BallThe core challenge of discovery is identifying information that is responsive but not privileged, achieved without undue burden or expense. There are multiple ways to approach the task, none optimal. The most labor-intensive method is called “linear human review,” where lawyers (for the most part) look at everything and cull responsive and privileged items. It sufficed in the pre-digital era when much effort and resources were devoted to recordkeeping. Despite being costly, slow and error prone, linear review was all we had, so became the gold standard for identifying responsive and privileged information.
Wednesday, March 25, 2015
Frivolous Law Suits? 26+ Reasons to Laugh at eDiscovery (Cartoon and Clip)
The Cartoon and Clip of the Week for March 25, 2015
The Humor of eDiscovery: 26 Cartoons and Clips
Monday, March 23, 2015
Do smart machines require ethical programming?
From Help Net SecurityRealizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well they maintain that trust. Central to establishing this trust will be ethical values that people recognize and are comfortable with. “Clearly, people must trust smart machines if they are to accept and use them,” said Frank Buytendijk, research vice president and distinguished analyst at Gartner. “The ability to earn trust must be part of any plan to implement artificial intelligence (AI) or smart machines, and will be an important selling point when marketing this technology. CIOs must be able to monitor smart machine technology for unintended consequences of public use and respond immediately, embracing unforeseen positive outcomes and countering undesirable ones.”
A Look Back: NetDiligence 2014 Cyber Claims Study
From Traub Lieberman Straus & ShrewsberryThe NetDiligence 2014 Cyber Claims Study relies on data voluntarily provided by insurers about amounts paid out on cyber claims occurring from 2011 through 2013. Since the Study only accounts cyber claims reported to larger insurers, NetDiligence believes its study only accounts for 5-10% of the total number of all cyber claims handled in those years.Among the highlights, the Study found that the predominant type of information exposed in any cyber claim remains personally identifiable information (“PII”). Under a definition of PII expanded to include email addresses and passwords, 97% of the information exposed constitutes PII. The remaining data exposed included protected health information (“PHI”) under HIPPA and payment card information (“PCI”).
Friday, March 20, 2015
Ending the Debate on TAR Seed Sets
By Hal MarcusIn the wake of Judge Peck’s recent Rio Tinto opinion on technology assisted review, the ediscovery blogosphere has been repeatedly quoting its bold pronouncements that judicial acceptance of TAR “is now black letter law” and that “it is inappropriate to hold TAR to a higher standard than keywords or manual review.” And rightly so — these statements appear intended to put outdated predictive coding debates to rest once and for all. Yet a good deal of the focus is going to the question Judge Peck raises but does not fully resolve: whether disclosure of TAR seed sets may be required.