In the News

In the News: EDRM Tackles TAR

Posted on September 19, 2017

EDRM Tackles TAR in Developing New E-Discovery Guidelines LegalTech News | 9.14.17 A conference at Duke Law School brought together judges, attorneys and technologists to debate potential guidelines and the future of technology assisted review. by Zach Warren TAR, also known in its long form as technology assisted review, is nothing new. Some e-discovery practitioners and Continue Reading »

In the News: EDRM to Develop GDPR Guidance for Cross Border Transfers

Posted on September 12, 2017

Legaltech News 9.12.17 The guidance will initially focus on data transfers between the U.S. and Ireland, and is scheduled to be released by the latter half of 2018. by Rhys Dipshan EDRM, the organization that devised the widely used Electronic Discovery Reference Model, has strived to keep e-discovery practitioners up to date on the ever Continue Reading »

In The News: New Security Audit Tool

Posted on March 29, 2017

Ride the Lightning 3.28.17 EDRM releases Security Audit Questionnaire By Sharon D. Nelson “The tool sets out 74 separate criteria under seven categories. Use it to assign the importance or weight of each of the criteria, so that you can emphasize key criteria that are mission-critical; or, downplay the criteria that are less important to Continue Reading »

In The News: EDRM Launches Security Audit Questionnaire

Posted on March 22, 2017

Technology in Practice Blog (Ricoh)  3.22.17 EDRM Launches Security Audit Questionnaire By Chris Plauschinn “In this world where information is currency, the security of that information is paramount. You are responsible to ensure your data is secure whether in your possession or in the possession of a partner. When engaging a partner, it is important to Continue Reading »

In the News: EDRM Security Audit Questionnaire

Posted on March 13, 2017

LegalTech News 3.13.17 EDRM Releases Security Audit Questionnaire with Focus on E-Discovery Security By Zach Warren “Despite many in-house counsel and law firms finally awakening to the current realities of cybersecurity, many still aren’t aware of all the places through which intruders can make their way into the organization. Third-party companies are perhaps the biggest Continue Reading »

Page 1 of 11