Explore
Archiving, Release, and Destruction of Information – The Importance of Information Governance as Preparation for Successful E-Discovery Series, Part 4

The governance of information addresses all aspects of its life cycle, and no stage is more important than this final phase. Data volumes continue to rise at an increased velocity, with 90 percent of all information having been created in the last two years. Keeping, archiving, cataloging and leveraging legacy data has been a solid and acceptable practice for nearly ever. While the storage of data becomes less expensive, the real issue is whether or not it is safe to hold on to unwanted and unneeded information. If the properly authorized destruction of data significantly reduces the risk associated with keeping data, shouldn’t it then be destroyed? Read on to learn more.

Read More

Using, Modifying, Storing, Retrieving Information – The Importance of Information Governance as Preparation for Successful E-Discovery Series, Part 3

The hard step that seems to give many organizations fits involves using, modifying, storing and retrieving information. Even if creating and ingesting are in perfect concert with information governance, chaos will result if this step doesn’t sustain that level of governance. Unfortunately, many organizations find it too cumbersome to set basic use restrictions. Learn how the governance of use, modification, storage, and retrieval come into play.

Read More

Compliance and Leveraging Information Governance – The Importance of Information Governance as Preparation for Successful eDiscovery Series, Part 2

Often we become so busy generating information that we do not take the time to examine how that process looks and how we can apply information governance principles from the very beginning. Appropriate preparation is vital. More and more professionals are uniting in the belief that information governance is the single most critical factor in maintaining control of big data. However, compliance for its own sake is not enough. Organizations must be able to leverage said compliance and demonstrate how it benefits an organization. Read more to learn about the solutions for compliance as well as how to efficiently and effectively leverage information governance.

Read More

Information Governance as eDiscovery Preparation – The Importance of Information Governance as Preparation for Successful E-Discovery Series, Part 1

Much has been discussed regarding the importance of starting properly with respect to the necessary preparation for a successful electronic discovery process. Tools such as the Electronic Discovery Reference Model provide guidelines and best practices and continue to map out how to successfully negotiate the difficult and expensive landscape of electronic discovery. Organizations continue to “fight the good fight” as they begin making their way along the EDRM pathway. However, the pathway is dotted with obstacles that appear without warning and endanger the success of the e-discovery effort. Read on to learn more and how information governance comes into play.

Read More

Dealing with In-House Counsel Concerns Regarding the Management and Discovery of Electronic Data

What e-discovery and data management issues keep in-house counsel up at night? XDD’s Jordan Serum discusses four common concerns and how to address them.

Read More

Data Retention Policies and Litigation Holds: More Than Just a Formality

Recent case illustrates the importance of properly managing electronic data through the implementation of strong data retention and litigation hold policies in order to avoid sanctions.

Read More

Lessons from Brown v. Tellermate

In a recent judicial opinion, severe sanctions were imposed for the defendant not properly identifying and preserving cloud-based data which would have been important to the case. XDD’s Dave Jensen offers insight to what should be learned from the case.

Read More

Doctors Who Text: Is This a HIPAA Violation?

If you are a health care provider and subject to HIPAA regulations, texting anything that includes protected health information (PHI) is a security concern.

Read More

Because you need to know

Contact Us