2018 State for State Courts Survey finds ODR attractive

On December 3, 2018, the National Center for State Courts issued a survey on 2018 State of the State Courts. The annual national survey conducted the study on 1,000 registered voters November 13-17, 2018. The survey shows that there is some interest in alternative methods to dispute resolution. Voters with previous experience dealing with the […]

Privilege Considerations in Cyber Incident Response

Interesting blog authored by Bart Huffman and Charles Salmon of Locke Lord LLP (see here) discusses some legal issues generated by cyber-security incidents. The blog specifically deals with the issue of whether non-public written records concerning the breach (e.g. minutes of meetings, communications among the response team, etc.) may be privileged or protected under the work product doctrine. For more information, […]

Tags: ,

Bart Huffman, Charles Salmon, Privilege Considerations in Cyber Incident Response

The authors (Bart Huffman and Charles Salmon of Locke Lord LLP) discuss some legal issues generated by cyber-security incidents. The blog specifically deals with the issue of whether non-public written records concerning the breach (e.g. minutes of meetings, communications among the response team, etc.) may be privileged or protected under the work product doctrine. The full text is available at http://www.jdsupra.com…

Tags: ,

Public comments welcome on the Sedona Conference’s TAR Case Law Primer

Public comments on TAR. On August 2016, the Sedona Conference Working Group on Electronic Document Retention (WG1) published the TAR Case Law Primer. The document discusses more than 30 decisions from state, federal, and foreign courts and administrative agencies addressing the use of Technology-Assisted Review (TAR) in civil discovery. The WG1 encourages public comment on […]

Tags: ,

Allyson Haynes Stuart, Making Sure BYOD Does Not Stand For “Breach Your Organization’s Data”, South Carolina Lawyer (March 2016)

From the article. “Reportedly, more than half of North American and European companies are developing a bring-your-own-device (BYOD) policy. But with the benefits of BYOD come many challenges. This Article explores the risks associated with BYOD, and offers practical solutions for employers seeking to maintain a secure corporate network”. The full text is available here […]

Tags:

Nathan M. Crystal, Is artificial intelligence a real danger? Which are its danger in the practice of law?

A number of leading scholars and business leaders have recently warned about the danger of artificial intelligence (see Stephen Hawking, Elon Musk and Bill Gates among others). For example Elon Musk, patron of Tesla, said: “I think we should be very careful about artificial intelligence. If I were to guess like what our biggest existential threat is, […]

Tags: ,

eDiscovery Digest, Are You Afraid of the Dark…Data?

The article discusses the definition given by Gartner of dark data as the “information assets organizations collect, process and store during regular business activities but, generally fail to use for other purposes”. The source highlights the importance of proactively defining the value of data on an organizational level (information governance). The full text is available […]

Tags:

1 2