This Might Sound Familiar

If you saw my presentation at Ignite Columbus a couple of weeks ago, then this might sound familiar.

Information management is the essential starting point for reducing the risk and cost of the discovery process. Organizations that have adopted an information governance strategy that supports requirements driven by both regulatory obligations as well as the needs of the business managers inherently will have an advantage because content has been created, shared and categorized according to its purpose in a business process.

It’s from one of the blog posts recapping Monday’s Keynote at LegalTech. Naturally, Fred Borchardt spoke about it much more eloquently than I could, and from a much more educated legal background than I have, but I think the gist of what I said at Ignite fits:

The whole idea behind EDRM is getting from all that volume of data you have stored all over the place, to just the relevant data you need, and it all starts with Information Management.

I, of course, was not speaking to a legal audience, much more a tech one, but the best way forward is the cooperation of both audiences. Lawyers need technological solutions to records management, and IT folks need legal/compliance direction from counsel. Will they be able to work together?

Tags: LegalTech, IgniteColumbus

Similar Posts

  • Are you Prepared For 100% Turnover?

    If you don’t have the money for significant pay raises, don’t offer other growth opportunities, and have a toxic workplace that doesn’t offer the opportunity for folks to have something that looks remotely like work-life balance, you should prepare yourself to replace everyone. Can you really afford to do that?

  • |

    Linked – Form of Production for Social Media

    Josh asks a good question here. One that is getting more and more complicated as we delve into not only social media, but a ton of other data sources for eDiscovery purposes. “Alternatively, how does one define the native application for social media? Is it from an app on a smartphone? Or was it created…

  • |

    Linked: Women in the Workplace

    This is an acute problem for many of us, who want to participate in doing the work of promoting diversity and inclusion but are still getting measured by everything other than that. And, as the survey points out, it is oftentimes women who take on this work, in an effort to help other women and minorities achieve.

    But, as much as the C-Level folks talk about the importance of this work, it is not a part of the job performance, nor is time and effort really allocated for it.

    How many of you volunteer to take on this work, running an employee resource group, putting together presentations, leading group discussions, often at the behest of top management, and then when it comes times for performance reviews, the only thing that matters is time spent on bringing in revenue?

    The message seems to really be, “It’s great that you want to do this work for us, but make sure you do it on your time because your productivity will be measured against the people who don’t spend any time at all doing this work”

  • This Week’s Links (weekly)

    Why true talent leaves e-discovery companies and what you can do to stop it I would say this is true about any organization, not just eDiscovery companies. tags: LitSupport MM Management LinkedIn gives users the blocking feature they asked for tags: MM SocNetPres Dissecting the uses of modern e-discovery software tags: LitSupport MM 10 More…

  • |

    Linked: Data From Fake Legal Requests Used to Sexually Extort Minors

    In this case, we have an emergency process. There are good reasons to have that process, if someone is threatening violence to themselves on social media, it’s useful for the tech company to share some information with law enforcement so they can be reached. But, having the ability to get that kind of response from tech companies is also an invitation to hackers. If they can create a fake emergency request they can collect personal information about any user. They can then use that information to target that individual.

    When you create that kind of system, the request needs to be coming from a safe, verified, source. When the source is compromised, and the receiver doesn’t have an excellent validation process, bad things are going to happen.

    Because when you have that kind of data, people will try and do bad things with it.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)