Data Collection – the first step in an eDiscovery project is usually underrated by the end-to-end managing team. The reason for this is because the data collection piece is often considered to be an “IT team only” task.
However, we believe the time has now come for the core discovery people and lawyers to look
Knovos
Knovos Blogs
Blog Authors
Latest from Knovos
CPRA (California Privacy Rights Act): An expansion to CCPA
It’s not even a decade or half, but just 15 months back, the Californian Government enforced a data protection regulation named CCPA (California Consumer Privacy Act). With a pleasant surprise (might be a dismal surprise for organizations!), another Act was announced recently named CPRA (California Privacy Rights Act).
Data Privacy Peers see the new…
How e-Signature simplifies and secures document workflow?
COVID-19, Work-From-Home (WFH), and remote work culture have been prime reasons to integrate e-Signature in the document workflow process. e-Signature eliminates the hassles of the conventional working process and paces up the business process.
This modernization workflow has simplified manual workflow with e-Signature for enhanced experience and productivity. It helps save time and cost of…
5 Undeniable Facts About eDiscovery
eDiscovery is one of the most intriguing topics of discussion when examining the use of technology by the legal profession. It is clear that the act of finding and collecting and potentially relevant evidence has morphed into a massive operation that involves large amounts of money, time, and other resources.
eDiscovery never fails to surprise…
What are the must-have technologies for arbitration?
Once COVID-19 has been declared a worldwide pandemic by World Health Organization (WHO), then the business of law came to a halt as the rest of the world. Many organizations, governments, and industries have to experience the impact of this global pandemic.
Arbitration is one of the most acceptable means of dispute resolution internationally. Enterprises,…
Information Rights Management (IRM): What enterprises want!
Enterprises started showing more interest in data-centric security platforms in the recent past. The growing use of email platforms and enterprise collaboration systems required an encryption-based environment that defines permissions for different users and user groups. Access rights (i.e. view, edit, download, print, copy, and forward) could be controlled with next-generation IRM-enabled collaboration solutions.
The…
AI (Artificial Intelligence) Transforms Contract Management Practices
AI is the new normal for any business these days. Managing tons of documents generated in a fraction of second is no more a manual job. Almost every business software is now using AI technology to automate the process and identify actionable insights from it. Contract management is no exception to this. According to a…
ICC Revised Rules 2021, focuses on greater efficiency and flexibility in Arbitration
Law firms and the legal industry in general have not been immune to COVID-19. They have had to bring significant technological change into their businesses. International Chamber of Commerce, popularly known as ICC, has recently revised its ‘Rules of Arbitration’ after the COVID-19 pandemic upended the ‘normal course of business’ globally. The need for flexibility,…
ABC of Contract Management
Contracts are the most commonly heard word in the world of business. No matter how big or small your company is, you must have encountered contracts at some point. It is the basic need for any two businesses or partners to collaborate and work in mutual consent. In addition, contracts are very crucial for a…
How 2021’s legal project management system looks like
Year 2020 has influenced the business world more than any historical event so far. People are forced to change their lifestyle and business model to cope up with the current situation. Apparently, no industry is untouched from the impact of COVID-19.
However, when speaking about the legal industry, there is very little to worry about.…
What Is End-To-End Legal Hold Management And Why A Law Firm Or Legal Department Requires It?
“Once a party reasonably anticipates litigation, it must suspend its routine document retention/destruction policy and put in place a ‘Legal Hold.”
The above definition is easy to understand the ‘legal hold’ process for any legal department or law firm. Legal teams need to ensure that the legal hold notification reaches to each custodian, stakeholder, or…
Is Online Dispute Resolution (ODR) the ‘new normal’ in Alternative Dispute Resolution (ADR)?
Covid is impacting almost every industry, including legal. The law has traditionally been a conventional and ‘old-school business’ but the pandemic triggered a series of unlikely changes in the way legal services are provided. The world came to a halt, so did the courts and other dispute resolution institutions, but gradually we found our stride,…
Online Dispute Resolution (ODR) is the ‘New Normal’ of Alternative Dispute Resolution (ADR)
The novel Corona virus changed the way industries used to work before. It impacted almost every industry, including legal. It gave an unlikely scope for the way legal services are provided worldwide. Fundamentally, legal services have been very conventional and ‘old-school’; however, COVID-19 changed the business of law. The world came at a halt, so…
25 Must-have Features in Effective Performance Management Software – by John Mercer for Municipal World magazine
From local municipalities to Federal agencies, governments of every size struggle with a range of challenges as they provide needed services to their constituents. With shrinking revenue and growing demand, the need for improved performance, accountability, and transparency may be greater than ever.
As the authors said in their iconic book Reinventing Government (David Osborne…
Elevate Security of Confidential Data with IRM (Information Rights Management)
Did you remember Anthony Levandowski? A Key technologist and pioneer of Google’s autonomous-vehicle project who downloaded more than 14,000 files containing proprietary information and made an unauthorized transfer to his personal laptop.
Cisco’s annual internet report (2018-2023) says two of the top 10 attacks are insider threat issues (file sharing and stolen credentials). It shows…
Experts Weigh In on the ‘New Normal’ of Working During the Pandemic: Part 3
As part of our series discussing current challenges posed by the pandemic, we continue to speak with industry experts across a range of specialties related to managing electronic information and gather their insights. In addition, these individuals have also provided some projections regarding their expectations of the “New Normal”, as travel restrictions are eased and…