Legal & Compliance

Reimagine information with Cloud Editions (CE) 24.3

The latest innovations in Business AI, Business Cloud, and Business Technology

July 16, 2024 7 minute read
Extend your Document Management solution with enhanced OpenText eDOCS InfoCenter solutions

Extend your Document Management solution with enhanced OpenText eDOCS InfoCenter solutions

OpenText™ eDOCS Cloud Editions (CE) 22.4 brings a number of new user collaboration and features to the OpenText InfoCenter interface. These exciting enhancements help users…

3 minute read

Curbing Insider Threats Today Requires a Holistic Approach 

Curbing Insider Threats Today Requires a Holistic Approach 

October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable information against outside hackers and…

5 minute read

The future of fax matters

The future of fax matters

Fax in 2022? Why don’t you just send it over on a dinosaur! Or a carrier pigeon? Honestly, we’ve heard them all. But fax in…

5 minute read

Axcelerate delivers enhanced BI to keep eDiscovery projects on time and within budget  

Axcelerate delivers enhanced BI to keep eDiscovery projects on time and within budget  

Why business intelligence is essential to eDiscovery  Business intelligence is a critical tool for legal operations and their in-house legal teams to improve matter management…

3 minute read

Gain deep insights into sensitive content

Gain deep insights into sensitive content

In most large organizations, sensitive, private, harmful, or even inappropriate content exists untethered somewhere within an enterprise and understanding the usage of that sensitive content…

4 minute read

Four reasons to make eDiscovery in the cloud work to your advantage   

Four reasons to make eDiscovery in the cloud work to your advantage   

The general benefits of cloud computing are well understood by CIOs and business unit owners. That is, they can trade fixed capital (infrastructure) expenses for…

4 minute read

OpenText™ Axcelerate™ and Slack™ integration helps eDiscovery and investigation teams quickly find the facts in chat data

OpenText™ Axcelerate™ and Slack™ integration helps eDiscovery and investigation teams quickly find the facts in chat data

Mainstream for business, chat message review is essential in legal matters Remote and hybrid work has created an enduring shift in how businesses operate and…

3 minute read

Portable Models in eDiscovery: Help or Hype? 

Portable Models in eDiscovery: Help or Hype? 

In civil litigation or regulatory inquiries, parties often must engage in electronic discovery, also known as eDiscovery, which is the process of identifying, preserving, collecting,…

10 minute read

Top reasons lawyers still experience fear, uncertainty and doubt (FUD) around use of technology-assisted review (TAR) — and how to overcome it 

Top reasons lawyers still experience fear, uncertainty and doubt (FUD) around use of technology-assisted review (TAR) — and how to overcome it 

Technology-assisted review, also referred to as predictive coding in document review related to litigation, investigation, and regulatory compliance matters, has achieved judicial acceptance and has…

5 minute read

Optimizing Subject Rights Requests: Minimizing Risks and Costs Through Adaptive eDiscovery Workflows – Part 2 

Optimizing Subject Rights Requests: Minimizing Risks and Costs Through Adaptive eDiscovery Workflows – Part 2 

In part one of this blog series, we discussed that subject rights requests (SRRs), including Data Subject Access Requests (DSARs) vary substantially in their requirements…

4 minute read

What’s new in OpenText Decisiv

What’s new in OpenText Decisiv

The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Decisiv™. Check out the latest updates below. May 2022: What’s New…

4 minute read

The How, When, Where, What and Who of dealing with data breaches

The How, When, Where, What and Who of dealing with data breaches

Data breaches—and the associated exfiltration of data– are a harsh reality of our digital world.  Business savvy organizations take all available steps to protect sensitive…

8 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.