Category «E-Discovery»

Listening to the Client

In over 30 years of working with law firms on improving productivity and profitability Heather Gray-Grant has seen countless marketplace surveys on the incredible value of client feedback mechanisms. In many instances it’s been labelled as one of the fastest and most effective ways to boost firm revenue. So, you’d think that law firms would be all over this business practice as a standard operating procedure. But…not so much. Gray-Grant discusses how to effectively execute client surveys and audits that will benefit firms as well as customers.

Subjects: Communications, Data Mining, KM, Legal Marketing, Legal Profession, Management

Finding People Resources and Sites 2022

This guide by Marcus Zillman identifies a wide range of free and fee based resources from which to choose to conduct people searches as well as brand and company reputation research, for business or personal reasons. It is important to note that the largest and most prominent data aggregators resell their content to other sites. In addition, data on free and some fee based sites may not be cleansed and can include inaccuracies that range from minor to critical. Also, many sites offer free search but charge a fee to review the results. It is therefore advisable to use multiple sources in your research and compare and contrast results before pursuing the use of these data.

Subjects: Big Data, Business Research, Competitive Intelligence, Data Mining, KM, Legal Research, LEXIS, Reference Resources, Search Engines, Search Strategies, Social Media, Westlaw

Pete Recommends – Weekly highlights on cyber security issues, September 18, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Apple’s Plan to Scan Your Phone Raises the Stakes on a Key Question: Can You Trust Big Tech?; ‘Breach of trust’: Police using QR check-in data to solve crimes; Agencies may want to establish a national strategy for contact-tracing apps; and Americans have little trust in online security: AP-NORC poll.

Subjects: Big Data, Blockchain, Computer Security, Cybercrime, Cybersecurity, Data Mining, Gadgets/Gizmos, Healthcare, Legal Research, Privacy

Artificial Intelligence Resources on the Internet 2021

Articles, studies, reports and investigations abound on how AI is impacting all aspects of our lives in areas that include our privacy, our social media usage, healthcare, the economy, the financial system, education, communications, law, the courts and technology. This timely, broad overview of resources, sites and applications by Marcus P. Zillman spans subject matter and disciplines as well as the many permutations of the technologies that drive artificial intelligence.

Subjects: AI, Data Mining, Health, Healthcare, KM, Legal Research, Social Media, Training

Pete Recommends – Weekly highlights on cyber security issues, May 23, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: US to ramp up tracking of domestic extremism on social media; Protecting agency assets begins with identity-centric security; Colonial Pipeline Cyberattack Highlights Need for Better Federal and Private-Sector Preparedness; and Cyber Attacks – A Rising Threat (Infographic).

Subjects: AI, Computer Security, Cybercrime, Cybersecurity, Data Mining, Energy, Legal Research, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues, April 10, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Five highlights from this week: LexisNexis to Provide Giant Database of Personal Data to ICE; Intelligence officers predict a future shaped by faceless enemies like disease, climate change; Police Ask for Your Video Doorbell Recordings FAQ; Feds seize fake COVID-19 Pfizer, vaccine websites; Utah pilots mobile driver’s license; and Dallas Cops Used Face Recognition Installed on Personal Phones.

Subjects: Communications, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Healthcare, Medical Research, Privacy, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, March 21, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Please Stop Using Text Messaging to Receive Login Codes; How to poison the data that Big Tech uses to surveil you; Ulysses Group Claims It Can Track Nearly Any Car in Real-Time; and Google Can Be Sued for Tracking Users in Private Browsing Mode.

Subjects: AI, Big Data, Cybercrime, Cyberlaw, Cybersecurity, Data Mining, Healthcare, Legal Research, Legislative, Privacy, Spyware, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, January 16, 2021

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: The evolving threat of ransomware: Beware of cyber extortion in 2021; What if opting out of data collection were easy?; How 5G and AI Are Creating an Architectural Revolution; and Insecure wheels: Police turn to car data to destroy suspects’ alibis.

Subjects: AI, Criminal Law, Cybercrime, Data Mining, Information Architecture, KM, Privacy, Social Media, Technology Trends

Managing Metadata: An Examination of Successful Approaches

If Google can deliver results across the entire internet in seconds, why do I have so much trouble finding things in my organization?” asked Jonathan Adams, Research Director at Infogix, at the DATAVERSITY® DGVision Conference, December 2019. In a presentation titled, “I Never Metadata I did Not Like” Adams outlined successful approaches to understanding and managing metadata – as reported by Amber Lee Dennis.

Subjects: Business Research, Competitive Intelligence, E-Discovery, Information Architecture, Information Management, Information Mapping, KM, Search Engines, Technology Trends

Pete Recommends – Weekly highlights on cyber security issues, October 25, 2020

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Trump Administration Develops Governmentwide Office Reopening Guidelines, With Contractor Help; USPS looks to monetize its mapping data; Amazon Faces Allegations It Harvested Sensitive Voice Data; and Google: Chinese Hackers Are Posing as McAfee to Install Malware.

Subjects: Civil Liberties, Communications, Congress, Cybercrime, Cybersecurity, Data Mining, Government Resources, Health, Healthcare, Legal Research, Legislative, Privacy, Social Media, United States Law