What Is the Information Lifecycle?

by: Kim Taylor, CEO Here at Innovative Discovery, we say that we partner with law firms, corporations, and government agencies to provide service, guidance, and consultation throughout the information lifecycle. It makes perfect sense to us, but for some, it may raise the question, “what exactly IS the information lifecycle?” In short, managed information goes through a natural process from … Read More

Your house knows you better than your significant other

By: Christopher Wooten, Senior Forensic Examiner In every relationship it takes time and moments together to create a bond. Once that bond is established, we begin to feel comfortable enough to share personal information about ourselves with another person. However, we tend to skip the “getting to know you phase” and start divulging all of our personal information with our … Read More

The Ever-Changing World of Legal Technology

By: Bryan Campbell, Chief Operations Officer When it comes to innovative and cutting-edge technology in the legal field, the world changes very quickly. Here are a few important things to know about the impact of technology on the future of legal research and eDiscovery. Law Firms Automated McKinsey Analytics says that 23% of the work performed by lawyers could be … Read More

Bridging the Gap Between Legal and Technology Communication During Complex eDiscovery Matters

By: Andrew Dorsey, Senior Project Manager eDiscovery matters require expertise from both the legal and technical fields, two disciplines that can often speak different languages, leaving the potential for communication gaps and disjointed work products. Moreover, experts in forensics, data services, hosting platforms, and managed review must precisely navigate client specifications in order to meet fast-paced and time-sensitive deadlines. While … Read More

When You Acquire a Business, Are You Acquiring a Data Breach Liability?

By: Kim Taylor, CEO The acquisition of a business involves many risks and uncertainties. The damage from past data breaches is potentially a huge risk. A Forbes article reports that 40% of companies acquiring a business discovered a cybersecurity problem post-acquisition. Verizon’s acquisition of Yahoo in 2017 is a great example of why it’s important to identify potential cybersecurity risks … Read More

Unlocking eDiscovery’s Hidden Compliance Powers

By: Nate Latessa, Vice President of Corporate Services In the two years since General Data Protection Regulation (GDPR) came into effect, over 100 privacy laws  have been introduced around the globe. Here in the US, the California Consumer Protection Act (CCPA), came into full effect in January 2020. Maryland, Nevada, Massachusetts, and Rhode Island also passed privacy legislation with at … Read More

Early Signs of Malicious Users on Your Network

By: Jamie Neilon Network security is of utmost importance in the modern business world. Keeping your data and your resources secure is essential, and while you may have a great firewall and comprehensive encryption, sometimes it’s not enough to keep a malicious user away from your network.  A malicious user could be someone with authorized access who is acting in … Read More

How to Get Your Team On-Board with Company-Wide Data Protection

By: Jamie Neilon You’re likely to benefit significantly from turning to security teams and vendors for data protection, but your employees also need to help by adhering to certain policies and engaging in best practices. The following are some of the ways you can make sure your company makes security a team effort. Emphasize the Need for Data Protection Make … Read More

Identifying and Combating Email Risks

By: Jamie Neilon Emails have become such a central part of our day-to-day lives, whether it is in a personal or professional atmosphere. Masses of people opt to send an email rather than having physical conversations either in-person or over the phone. Email provides access to so many other avenues in our lives, whether that’s communicating with colleagues or receiving … Read More