ZyLAB Blog

The ZyLAB Blog

 

Achieve Cost Savings with eDiscovery

 14-05-2015 (141)
 Diem Shin

We all understand the the volume of data that companies collect and keep is growing. That is expected to continue to increase. The valuable data lies in the unstructured data which makes up 78% of all data. For a discovery process, this presents challenges and rising costs in dealing with growing volume of information. View our infographic below to...

Read More »

Prejudice, Proportionality and Precision: 2015 FRCP Amendments

 06-05-2015 (499)
 Mary Mack

Some believe that the amendments, effective December 2015 if Congress does not intervene, will not change eDiscovery practice.  I am not one of them.  The 2015 amendments were designed primarily to reduce costs for producing parties:  the cost of losing a case due to terminating sanctions, the cost of fees designed to punish and co...

Read More »

The Growing Importance of Social Media

 29-04-2015 (345)
 Johannes Scholtes

According to Salary.com, 89% of employees spend some at work every day visiting social media sites such as Facebook, Twitter, and Linkedin. Social media is an integral part of people’s daily lives and the growth of mobile devices has only proliferated that growth. Even companies themselves are utilizing social media channels to advertise...

Read More »

eDiscovery Proof Your Email Archive

 22-04-2015 (323)
 Bob Fucci

As email remains a critical form of communication for businesses, many companies are wrestling with the question of how long should the email be retained, what should be done with them, and when should they be deleted. The answer depends on the situation especially in today’s litigious climate and highly regulated environment where email is r...

Read More »

eDiscovery AND (Security OR Privacy)

 15-04-2015 (373)
 Mary Mack

Security and Privacy are growth areas in legal practice, class actions and eDiscovery.   Privacy breaches, intellectual property and critical infrastructure protection are driving security, and security is accelerating as an organizational imperative.  Chain of custody and authenticity can be called into question if systems are not...

Read More »

Three Ways to Reduce Your Discovery Costs

 08-04-2015 (376)
 Bob Fucci

Corporations are inundated with data. Whether it be customer data, employee data or transactional data, there is a lot of it. However, when it comes to discovery, processing and reviewing large amounts of data is time consuming and costly. Delays in production could result in severe fines. While eDiscovery is a necessity, are there ways to reduce y...

Read More »

Cloud Computing: Essential Checklist for eDiscovery

 30-03-2015 (331)
 Bob Fucci

While organizations are using cloud solutions more and more these days to manage their storage costs and capacity, eDiscovery from those solutions often remains an afterthought. There’s little consideration on how that information in the cloud will be placed on hold, accessed, reviewed or produced in response to litigation or regulatory reque...

Read More »

Email is still alive!

 24-03-2015 (435)
 Bob Fucci

As other forms of communication such as social networking, instant messaging and mobile IM, increase in popularity, you would think that email as a form of communication is dead. However, that is far from the truth! Email remains the most ubiquitous form of communication for businesses. In 2014, there were 4.1 billion email accounts worldwide and t...

Read More »

Privacy is the Why and Technology is the How

 17-03-2015 (173)
 Johannes Scholtes

Last week, at the Georgetown Law Continuing Legal Education event in Washington DC, I attended an interesting session on security, “Preparing for and Responding to Data Security Incident”. The session was   moderated by Heidi Wachs, Special Counsel at Jenner & Block. Panelist Allen G. Brandt, Anne Fealy, Oliver M. Johnson ...

Read More »

Lessons Learned from Hillary Clinton's Email Controversy

 10-03-2015 (278)
 Johannes Scholtes

Hillary Clinton is under heavily criticism for using her personal email address to conduct official government business as Secretary of State. In addition the use of her personal email for business, she also failed to preserve her correspondence on the State Department's servers as is currently required under federal law. The Managin...

Read More »

Page 1 of 3First   Previous   [1]  2  3  Next   Last