Healthcare Industry: Second Request Expertise Consilio’s integrated discovery services and Immediate Case Assessment™ analysis help a client save as much as $2.5 million in eDiscovery costs for a second request. Client
Eye on Discovery – 11.5 Million Reasons for Law Firms to Take Data Security Seriously
Eye on Discovery - 11.5 Million Reasons for Law Firms to Take Data Security Seriously In early April, we bore witness to what may be the largest data breach in history: 11.5 million confidential
Eye on Discovery: Stop the Madness: Close the Gaps Now to Avoid Discovery Mayhem Later Copy
Eye on Discovery - Stop the Madness: Close the Gaps Now to Avoid Discovery Mayhem Later Gaps are good if you’re a basketball team playing strong defense in the NCAA tournament. In March Madness,
Eye On Discovery: The Eight Commandments of Data Preservation
Eye On Discovery: The Eight Commandments of Data Preservation Since the addition of the e-discovery amendments to the Federal Rules of Civil Procedure in 2006, sanctions for spoliation have risen markedly. This trend seems
Decoding Encrypted Documents in Cross-Border eDiscovery
Decoding Encrypted Documents in Cross-Border eDiscovery Successfully managing encrypted data depends on the processes and technology used. With the right know-how and technology, it is possible to properly collect and decrypt data and
It’s a Small World After All – Best Practices for Conducting Cross-Border eDiscovery
It’s a Small World After All - Best Practices for Conducting Cross-Border eDiscovery Every day, the world grows smaller as companies stretch their operations around the globe. As businesses cross international borders, so does
Encryption is Everywhere: A Practical Look at Steps to Consider
Encryption is Everywhere: A Practical Look at Steps to Consider Jon Fowler discusses data encryption and the problems it can potentially create for the eDiscovery process, as well as several techniques to approach
EDisclosure – convergence of IT and Law
EDisclosure - convergence of IT and Law The process of responding to litigation or an investigation is no longer simply a matter of locating potentially relevant hard copy documents in the company archives
Part 3 of 3: Mapping and collecting data stored in an IaaS environment by Jonathan Fowler
Part 3 of 3: Mapping and collecting data stored in an IaaS environment by Jonathan Fowler August 2012 In part one of this three-part series, we discussed some of the basic concepts and
Part 2 of 3: Mapping and collecting data stored in an IaaS environment by Jonathan Fowler
Part 2 of 3: Mapping and collecting data stored in an IaaS environment by Jonathan Fowler July 2012 In part one of this three-part series, we discussed some of the basic concepts and
Keeping up with technical changes in disclosure by Jerome Torres Lozano
Keeping up with technical changes in disclosure by Jerome Torres Lozano July 2012 An emerging but important trend is the use of the cloud for the creation and storage of business documents, which
Seek and ye shall find by Adrian White
Seek and ye shall find by Adrian White June 2012 With discovery being a major component of litigation in many jurisdictions, the efficient conduct of document retrieval can help litigants avoid a judicial
Part 1 of 3: Mapping and collecting data stored in an IaaS environment by Jonathan Fowler
Part 1 of 3: Mapping and collecting data stored in an IaaS environment by Jonathan Fowler June 2012 In this three-part series, we will discuss some of the challenges and issues companies must
Digital guardians: Protecting companies against IP theft by John Shaw
Digital guardians: Protecting companies against IP theft by John Shaw May 2012 As technology becomes more sophisticated and the tracking of intellectual property (IP) theft becomes more challenging, the pressure is on IT
Dealing with Disclosure by Drew Macaulay
Dealing with Disclosure by Drew Macaulay March 2012 Electronic trails are growing in volume and complexity, creating a nightmare for lawyers in disclosure exercises. And there are serious consequences in getting it wrong.
Deluge of Data by Jerome Torres Lozano
Deluge of Data by Jerome Torres Lozano February 2012 Just five years ago, the main source of electronic information was email, followed some way behind by word processor documents. Now, however, important business
How Businesses Can Protect Themselves from IP Theft by John Shaw
How Businesses Can Protect Themselves from IP Theft by John Shaw February 2012 Software companies can spend enormous amounts of money and time developing new products; yet underestimate the ease of code being
Speedy Recovery: Retrieving lost emails as part of an investigation by John Shaw
Speedy Recovery: Retrieving lost emails as part of an investigation by John Shaw September 2011 With the rise of the digital age and the widespread use of computers and electronic communication by individuals
Law Gazette: “International Document Management” by Drew Macaulay
Law Gazette: "International Document Management" by Drew Macaulay April 2011 In a globalized environment where legal and regulatory matters can involve corporate subsidiaries spanning multiple jurisdictions, moving data from one country to another