ZyLAB Blog

The ZyLAB Blog

 

eDiscovery AND (Security OR Privacy)

 15-04-2015 (140)
 Mary Mack

Security and Privacy are growth areas in legal practice, class actions and eDiscovery.   Privacy breaches, intellectual property and critical infrastructure protection are driving security, and security is accelerating as an organizational imperative.  Chain of custody and authenticity can be called into question if systems are not...

Read More »

Three Ways to Reduce Your Discovery Costs

 08-04-2015 (195)
 Bob Fucci

Corporations are inundated with data. Whether it be customer data, employee data or transactional data, there is a lot of it. However, when it comes to discovery, processing and reviewing large amounts of data is time consuming and costly. Delays in production could result in severe fines. While eDiscovery is a necessity, are there ways to reduce y...

Read More »

Cloud Computing: Essential Checklist for eDiscovery

 30-03-2015 (184)
 Bob Fucci

While organizations are using cloud solutions more and more these days to manage their storage costs and capacity, eDiscovery from those solutions often remains an afterthought. There’s little consideration on how that information in the cloud will be placed on hold, accessed, reviewed or produced in response to litigation or regulatory reque...

Read More »

Email is still alive!

 24-03-2015 (287)
 Bob Fucci

As other forms of communication such as social networking, instant messaging and mobile IM, increase in popularity, you would think that email as a form of communication is dead. However, that is far from the truth! Email remains the most ubiquitous form of communication for businesses. In 2014, there were 4.1 billion email accounts worldwide and t...

Read More »

Privacy is the Why and Technology is the How

 17-03-2015 (108)
 Johannes Scholtes

Last week, at the Georgetown Law Continuing Legal Education event in Washington DC, I attended an interesting session on security, “Preparing for and Responding to Data Security Incident”. The session was   moderated by Heidi Wachs, Special Counsel at Jenner & Block. Panelist Allen G. Brandt, Anne Fealy, Oliver M. Johnson ...

Read More »

Lessons Learned from Hillary Clinton's Email Controversy

 10-03-2015 (205)
 Johannes Scholtes

Hillary Clinton is under heavily criticism for using her personal email address to conduct official government business as Secretary of State. In addition the use of her personal email for business, she also failed to preserve her correspondence on the State Department's servers as is currently required under federal law. The Managin...

Read More »

Modernizing Your Information Practices

 04-03-2015 (252)
 Bob Fucci

The Managing Government Records Directives (M-12-18) puts into law a requirement to modernize and improve record keeping and information management at federal government agencies. Under the Directive, government agencies are required to transition to digital record keeping by 2019. One of the goals behind the Directive is to ensure efficiency, tran...

Read More »

Right in Time Partnering is not Effective or Strategic

 03-03-2015 (55)
 Bob Fucci

In order to remain competitive in a global and emerging markets, it is common for enterprises to create value through partnerships. Partnerships can help companies expand into other business areas, increase their product and services offerings, and drive continuous improvements. And meaningful partnerships are the foundation for...

Read More »

Top 7 Privacy Concerns

 18-02-2015 (341)
 Mary Mack

The recent Anthem data breach has brought security and privacy to the forefront for most organizations. While at Legal Tech New York, I moderated a panel on privacy with panelists discussing some of the top privacy concerns for this year. Sponsored by Women in Ediscovery on February 5, 2015, the panel included: Amanda Kosowsky, VP, AGC, ...

Read More »

Are you Being Smart With Your Data?

 10-02-2015 (550)
 Johannes Scholtes

Last week, I attended a session at Legal Tech on “dark data” and the costs and risks of not managing that data. The session indicated that the increase of security breaches has brought information governance to the forefront for most companies. There’s an imminent and pressing need to get control of the data before the next securi...

Read More »

Page 1 of 3First   Previous   [1]  2  3  Next   Last