Legal
Master Your Inbox: Get the Ultimate Tool for Automated Email Filing
Valuable information is buried in emails – from your clients, sensitive projects and legal matters. It is increasingly difficult to find, organize and see the…
Preparing fax for the next era of enterprise communications
“Wait! Are you seriously going to fax me that request?” It’s a question echoing across workplaces in industries like healthcare, financial services, and law, especially…
• 7 minutes read
Sometimes in eDiscovery more is better
With the proliferation of electronic data, the vast majority of business communication is now in electronic format. It is not surprising that the use cases…
• 6 minutes read
What we can learn from the ACC 2022 State of Cybersecurity Report
Recently, the Association of Corporate Counsel (ACC) Foundation, in collaboration with Ernst & Young, LLP, released the 2022 State of Cybersecurity Report, An In-house Perspective….
• 6 minutes read
A good foundation is key to digital forensic investigations
I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When we build a house, we…
• 4 minutes read
Redaction blunders in context
There are many great articles that focus on the headache (and harm) that occurs when sensitive data is not redacted properly in eDiscovery, investigations, and…
• 4 minutes read
How to generate a custom shortlist of eDiscovery vendors
If you’re like some companies, you may be using outdated, mishmashed software or a myriad of point solutions to manage your eDiscovery processes. While this…
• 3 minutes read
What’s new in OpenText Axcelerate
The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest updates below. October 2022: What’s new…
• 14 minutes read
Crises, cartels and collusion: dawn raids resume with full force
After several years pause when competition authorities around the world suspended on-the-spot inspections during the global pandemic, dawn raids have resumed with full force. In…
• 5 minutes read
Twitter v. Musk illustrates how sources of discoverable ESI are more diverse than ever
By now, we all know that Elon Musk has finally completed his purchase of Twitter, but that purchase was anything but a smooth process. It…
• 5 minutes read
Responding to Second Requests
Recent experience has convinced me that familiarity breeds complacency when it comes to responding to Antitrust Second Requests. In the name of the “unique nature”…
• 10 minutes read
Extend your Document Management solution with enhanced OpenText eDOCS InfoCenter solutions
OpenText™ eDOCS Cloud Editions (CE) 22.4 brings a number of new user collaboration and features to the OpenText InfoCenter interface. These exciting enhancements help users…
• 3 minutes read
Curbing Insider Threats Today Requires a Holistic Approach
October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable information against outside hackers and…
• 5 minutes read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.