Recent Posts
Dec 15, 2015
Sedona Conference Commentary on the Protection of Privileged ESI Released
Working Group 1 of The Sedona Conference, the Working Group responsible for The Sedona Principles and other leading commentaries on
Read MoreDec 14, 2015
Free Book: Technology Assisted Review for Smart People
I just finished reading the book TAR for Smart People as a result of interviewing John Tredennick, CEO of Catalyst, for
Read MoreDec 10, 2015
U.K.'s GCHQ Admits to Widespread Hacking of Computers, Phones and Networks
SC Magazine reported this week that the UK's GCHQ (Government Communications Headquarters) has admitted for the first time that it
Read MoreDec 09, 2015
Darwin's Law Strikes Again: Burglar Breaks Into Business Wearing Shirt With His Name on It
WPXI.com reported on Sunday one of those small but delectable stories that I love and which prove Darwin's theory of
Read MoreDec 08, 2015
Homeland Security: I'm From the Government and I'm Here to Help
Believe it or not, there's some truth to that. Homeland Security offers a number of information security resources for small
Read MoreDec 07, 2015
A Concise History of Technology-Assisted Review
Law Technology Today (sub.req.) has published "A Brief History of Technology Assisted Review" by my friend Bob Ambrogi and Thomas
Read MoreDec 03, 2015
New Federal Rules of Civil Procedure Took Effect December 1st
The first E-Discovery Day occurred on December 1st and I missed all the hoopla while attending to the business of
Read MoreDec 02, 2015
Highlights of the ILTA 2015 Technology Survey
Hat tip to Bob Ambrogi for sharing some early highlights from ILTA's 2015 Technology Survey. Hat tip to his source,
Read MoreDec 01, 2015
Tor Seeks to Reduce Dependence on U.S. Government Funds
Some headlines just make you shake your head and smile. I doubt most people understand that the U.S. Government provides
Read MoreNov 30, 2015
ABA Journal Names Ride the Lightning to the Blawg 100 – and the Hall of Fame
It was certainly a Thanksgiving gift to receive word that the ABA Journal had named Ride the Lightning to the
Read MoreNov 25, 2015
Anonymous Rickrolling ISIS Social Media Accounts May Hinder Counter-Terrorism
I know some of you are asking "Rickrolling" – what's that?" Well, it's the prank of posting links on social
Read MoreNov 24, 2015
Is a Lawyer Ethically Required to Replace Hacked Client Funds? It Depends.
On October 23, the North Carolina State Bar answered that question with an "it depends" ethics opinion which is well summarized
Read More