Beyond E-Discovery: Using AI to Enhance Client Service in the Legal...
A Brief Overview of E-Discovery
eDiscovery as the CIO
eDiscovery: Every CIO's Dreaded Call
Creating a Repeatable, Flexible and Defensible ESI Plan
Mark Van De Voorde, Chief Legal and Administrative Office, Victaulic
E-Discovery, the Internet of Things and the Big Data Landscape
James Carpenter, CTO and CISO, Texas Scottish Rite Hospital for Children
Growth in eDiscovery Analytics Means Growth in Profits for Law Firms
Terry Reeves, CEO, Elite Document Technology and Elite Deposition Technologies
"AI is a Litigation Force Multiplier"
Martha Louks, Director of Technology Services - McDermott Discovery, McDermott Will & Emery LLP
Thank you for Subscribing to CIO Applications Weekly Brief
Harnessing the Potential of E-Discovery Workflows
By harnessing the potential of various processes and technology that are available today, e-discovery professionals can assist organizations with General Data Protection Regulation (GDPR) compliance to a greater extent. As the deadline for GDPR enforcement is finally closing by, organizations are rushing to modify their operations.
About two years after the approval by the European Parliament in 2016, organizations across the globe must comply with its requirements for data protection, privacy, processing, and consent. Unfortunately, if survey results are to be trusted, most organizations will not be ready as per the government guidelines. Many organizations have conducted research into the topic.
Take a look at some of the strategic ways in which technology experts can contribute to GDPR compliance:
Proactive data mapping and information governance strategies
Organizations need accurate data maps and ways to keep them updated through a process of custodian interviews and data source crawling and cataloging. As e-discovery can rapidly identify data, it enables responding to a case much quicker, more seamless, and economic.
Searching and providing data for subject access requests (SARs)
Most of the organizations cannot rely on ad hoc processes within the predefined time constraints. They must have defined workflows and technologies to ensure they meet the one-month deadline.
Preparing for and implementing “Right to be Forgotten” requests
Data subjects can request that personal information stored to be erased. This includes items that are posted online by the subject themselves. To comply, organizations must erase data “without undue delay.”