Discovery Risk Mitigation – Preservation

Data Preservation

Should It Stay or Should It Go? A terrible wordplay on The Clash’s 1981 classic perhaps, but to retain or dispose of data is a core theme in this, the last piece in our Discovery Risk Mitigation series of blogs. You’ll recall the previous discussion that Information Governance is increasingly both a critical aspect of […]

Discovery Risk Mitigation – Remediation

remediation

Improving preparedness to eDiscovery events In the previous article, we explored considerations when assessing your current eDiscovery and information governance maturity.  Having undertaken that exercise and established a benchmark, clearly, the next step is to implement a series of corrective measures. But where should you start? What demands your most immediate attention, and what can […]

eDiscovery Maturity Assessment

eDiscovery Maturity Assessment

Assessing your corporate capability to respond effectively to investigations and eDiscovery events. In an earlier post, I introduced Discovery Risk Mitigation, our structured journey-based approach to helping organisations reduce their exposure to the risks inherent within the ever-expanding data and governance landscapes in which we now work. Having understood why preparedness is a good thing […]

Discovery Risk Management

A worker using Salient Discovery's eDiscovery service

Mitigating the eDiscovery risks due to the explosion of electronic data in your business through a structured programme of preparedness. Being Prepared I’m sure most people are familiar with the expression “prevention is better than cure”. It sounds like generally sound advice to me and I’m sure most would probably agree. But in truth, to […]

Salient’s New Utility Unlocks Tech-Assisted Bank Statement Analytics

bank statement analytics

Technology has a gone a long way towards streamlining investigations, but one particular area of evidence has consistently flown under the radar of all the usual forensic tools: bank statements. “Following the money” using these transactional documents is often a pivotal part of investigations, and yet it has remained an arduous manual process that guzzles […]

How to Keep Employee Monitoring on the Right Side of Data Privacy Laws

How to Keep Employee Monitoring on the Right Side of Data Privacy Laws

Monitoring employee conduct has always been part of the corporate environment. In many cases, it’s an essential component of prevention strategies for data leaks, fraud, theft of intellectual property and other potentially harmful behaviour. Monitoring also enables organisations to supervise and manage productivity, enforce organisational policies and procedures, manage quality control and protect employees and […]

Insider Risk Management and the Power of Proactive Threat Detection

Insider Risk Management and the Power of Proactive Threat Detectionr of proactive threat detection

Many businesses are under the impression that the biggest risk to their data security comes from external cyber-attacks breaching their perimeter. In our experience investigating security breaches, however, we can confidently say that equally damaging threats can often come from within. Whether you’re talking unintentional data spillage, malicious IP theft, confidentiality breaches, regulatory compliance violations, […]

Using Cognitive Analytics to Expose Leading Indicators and Build Fact Patterns

Using Cognitive Analytics to Expose Leading Indicators and Build Fact Patterns

It is generally accepted that the single largest cost in addressing any eDiscovery exercise is neither the technology nor the litigation support teams employed, but rather it is the cost of lawyer review time. And that makes perfect sense. After all, you are paying for the lawyers’ understanding of the law and experience of its […]

Information Analytics: Embracing Information Anarchy

information-analytics-intelligence

In today’s world of plentiful analytics capability, embracing information anarchy would sound a complete anathema to most people. But the problem is that planning strategic data warehousing and dashboarding solutions often involve many stakeholders and can take several months to design and complete. While that remains a commendable longer-term approach to information analytics, there is […]

Can you benefit from using Microsoft’s eDiscovery for non-Office 365 data sources?

When it comes to eDiscovery, most discussions tend to focus on the right-hand side of the eDiscovery Reference Model (EDRM) – the review, production and presentation processes that legal teams typically perform with the help of heavy-duty, dedicated review tools such as Relativity, Logicull and EDT. What people seem to forget, however, is that no […]