This document provides an overview of the key concepts in electronic discovery (eDiscovery). It discusses what eDiscovery is, the large volumes of electronically stored information (ESI) that exist, and how ESI is considered under the Federal Rules of Civil Procedure. It then outlines the main stages in the eDiscovery process according to the Electronic Discovery Reference Model (EDRM): preservation, identification and collection of ESI sources, culling and analysis to remove excess data, review of remaining documents, and production of documents. It notes trends in eDiscovery such as a focus on cost control and proportional discovery.
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersTravis Greene
Our presentation introduces the GDPR then gives a brief overview of key GDPR principles and explains how they are likely to affect data scientists and behavioral researchers.
The goal of this white paper is to provide an introduction to the key areas involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process. Note that the goal of this report is not to offer legal advice or legal opinions on specific legal issues related to e-discovery, and it should not be used in this manner.
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersTravis Greene
Our presentation introduces the GDPR then gives a brief overview of key GDPR principles and explains how they are likely to affect data scientists and behavioral researchers.
The goal of this white paper is to provide an introduction to the key areas involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process. Note that the goal of this report is not to offer legal advice or legal opinions on specific legal issues related to e-discovery, and it should not be used in this manner.
If you are working on a computational text analysis project and have wondered how to legally acquire, use, and publish text and data, this workshop is for you! We will teach you 5 legal literacies (copyright, contracts, privacy, ethics, and special use cases) that will empower you to make well-informed decisions about compiling, using, and sharing your corpus. By the end of this workshop, and with a useful checklist in hand, you will be able to confidently design lawful text analysis projects or be well positioned to help others design such projects.
Simons orcid forum canberra 2018-PIDs in researchARDC
The value of persistent identifiers in research - Natasha Simons (ARDC) & Josh Brown (ORCID) - presented at the ORCID forum in Canberra 6th September 2018
DataCite and its Members: Connecting Research and Identifying KnowledgeETH-Bibliothek
PIDs and their metadata support scholarly research and its increasing amounts and
variety of scholarly output. DataCite provides services which enable the research community to identify, connect, cite and track these outputs, making content FAIR. New
services include data level metrics and the use of identifiers for organizations and new
types of content, e.g. software, repositories and instruments. As an open, collaborative
and community driven membership organization we rely on our members for their
input and experience to build services that are beneficial for the research community
as a whole. DataCite services as well as current and future initiatives will be described
and it will be shown how members can contribute and benefit. Over the course of the
years, our membership has grown and diversified and we are therefore refreshing and
clarifying our member model. The new member model will be presented and described.
Predict Conference: Data Analytics for Digital Forensics and CybersecurityMark Scanlon
Information overload is one of the biggest problems facing professionals working in the fields of Digital Forensics and Cybersecurity. The sheer volume of cases requiring digital forensic analysis in law enforcement agencies throughout the world is outstripping the capacities of digital forensic laboratories. This has resulted in huge digital evidence backlogs becoming commonplace and cases being ruled upon in court without the inclusion of potentially pertinent information, which is sitting idle in some evidence store. As is commonly relayed in the media, the frequency of cyberattacks being faced by governments, law enforcement agencies, and industry is increasing, alongside the sophistication of the techniques used. Current rules-based network intrusion detection systems are predominantly based on historic, known threat vectors and result in a very high amount of false positive alerts being generated. Intelligent, real-time, automated data processing and event categorisation is one solution that shows great promise to combat this information overload.
Text Data Mining & Publishing: Legal LiteraciesRachael Samberg
If you are working on a computational text analysis project and have wondered how to legally acquire, use, and publish text and data, this workshop is for you! We will teach you 5 legal literacies (copyright, contracts, privacy, ethics, and special use cases) that will empower you to make well-informed decisions about compiling, using, and sharing your corpus. By the end of this workshop, and with a useful checklist in hand, you will be able to confidently design lawful text analysis projects or be well positioned to help others design such projects. Consider taking alongside Copyright and Fair Use for Digital Projects. Comes with associated exercise: http://ucblib.link/rw
Positioning record keepers as data management professionalsRebecca Grant
Slide deck presented at the Archives and Records Association conference, Glasgow, on Friday 31 August 2018.
Abstract:
This paper will discuss records professionals as people looking after records, with a particular focus on the people who look after research data and the scientific record.
Research data management, data curation and data preservation, whilst long-standing skills areas in their own right, are relatively new skills to many parts of the research
institution, and are most often required within universities to assist researchers in looking after their research outputs. Although there is an increasing need for this type
of support for researchers, there is little consensus on who should have overall responsibility for providing it: the role may be filled by librarians, the research office, IT support, and in many cases university archivists or records managers.
With a lack of consensus on the professional expertise required, those working in data management are investigating new ways to approach issues which are commonly addressed by records professionals in their day-to-day work. Challenges such as
appraisal and preservation have been identified in some research-performing institutions as new problems to be solved, without necessarily acknowledging the existing expertise within the archive and records manager professions.
In this presentation we will describe the current role of records professionals in data management, and the specific expertise and skills which we can bring to this emerging area. We will also present the work that a group of records professionals are
currently undertaking to raise the profile of archivists and records managers as ‘people who can look after data’ in the international data management community.
A DARPA Project named Memex crawls the Deep web looking for content to index for law enforcement use. Their advanced algorithms are designed to by pass membership areas and pay walls as well as avoid detection by system administrators. Learn more:
http://christopher.killerpenguin.net/blog/darpaprojectmemexerodesprivacy
If you are working on a computational text analysis project and have wondered how to legally acquire, use, and publish text and data, this workshop is for you! We will teach you 5 legal literacies (copyright, contracts, privacy, ethics, and special use cases) that will empower you to make well-informed decisions about compiling, using, and sharing your corpus. By the end of this workshop, and with a useful checklist in hand, you will be able to confidently design lawful text analysis projects or be well positioned to help others design such projects.
Simons orcid forum canberra 2018-PIDs in researchARDC
The value of persistent identifiers in research - Natasha Simons (ARDC) & Josh Brown (ORCID) - presented at the ORCID forum in Canberra 6th September 2018
DataCite and its Members: Connecting Research and Identifying KnowledgeETH-Bibliothek
PIDs and their metadata support scholarly research and its increasing amounts and
variety of scholarly output. DataCite provides services which enable the research community to identify, connect, cite and track these outputs, making content FAIR. New
services include data level metrics and the use of identifiers for organizations and new
types of content, e.g. software, repositories and instruments. As an open, collaborative
and community driven membership organization we rely on our members for their
input and experience to build services that are beneficial for the research community
as a whole. DataCite services as well as current and future initiatives will be described
and it will be shown how members can contribute and benefit. Over the course of the
years, our membership has grown and diversified and we are therefore refreshing and
clarifying our member model. The new member model will be presented and described.
Predict Conference: Data Analytics for Digital Forensics and CybersecurityMark Scanlon
Information overload is one of the biggest problems facing professionals working in the fields of Digital Forensics and Cybersecurity. The sheer volume of cases requiring digital forensic analysis in law enforcement agencies throughout the world is outstripping the capacities of digital forensic laboratories. This has resulted in huge digital evidence backlogs becoming commonplace and cases being ruled upon in court without the inclusion of potentially pertinent information, which is sitting idle in some evidence store. As is commonly relayed in the media, the frequency of cyberattacks being faced by governments, law enforcement agencies, and industry is increasing, alongside the sophistication of the techniques used. Current rules-based network intrusion detection systems are predominantly based on historic, known threat vectors and result in a very high amount of false positive alerts being generated. Intelligent, real-time, automated data processing and event categorisation is one solution that shows great promise to combat this information overload.
Text Data Mining & Publishing: Legal LiteraciesRachael Samberg
If you are working on a computational text analysis project and have wondered how to legally acquire, use, and publish text and data, this workshop is for you! We will teach you 5 legal literacies (copyright, contracts, privacy, ethics, and special use cases) that will empower you to make well-informed decisions about compiling, using, and sharing your corpus. By the end of this workshop, and with a useful checklist in hand, you will be able to confidently design lawful text analysis projects or be well positioned to help others design such projects. Consider taking alongside Copyright and Fair Use for Digital Projects. Comes with associated exercise: http://ucblib.link/rw
Positioning record keepers as data management professionalsRebecca Grant
Slide deck presented at the Archives and Records Association conference, Glasgow, on Friday 31 August 2018.
Abstract:
This paper will discuss records professionals as people looking after records, with a particular focus on the people who look after research data and the scientific record.
Research data management, data curation and data preservation, whilst long-standing skills areas in their own right, are relatively new skills to many parts of the research
institution, and are most often required within universities to assist researchers in looking after their research outputs. Although there is an increasing need for this type
of support for researchers, there is little consensus on who should have overall responsibility for providing it: the role may be filled by librarians, the research office, IT support, and in many cases university archivists or records managers.
With a lack of consensus on the professional expertise required, those working in data management are investigating new ways to approach issues which are commonly addressed by records professionals in their day-to-day work. Challenges such as
appraisal and preservation have been identified in some research-performing institutions as new problems to be solved, without necessarily acknowledging the existing expertise within the archive and records manager professions.
In this presentation we will describe the current role of records professionals in data management, and the specific expertise and skills which we can bring to this emerging area. We will also present the work that a group of records professionals are
currently undertaking to raise the profile of archivists and records managers as ‘people who can look after data’ in the international data management community.
A DARPA Project named Memex crawls the Deep web looking for content to index for law enforcement use. Their advanced algorithms are designed to by pass membership areas and pay walls as well as avoid detection by system administrators. Learn more:
http://christopher.killerpenguin.net/blog/darpaprojectmemexerodesprivacy
Moбильная база данных Realm. Прошло ли время SQLite?Олег Чебулаев
- Обзор систем хранения данных
- Что такое Realm?
- Realm изнутри и почему он такой быстрый
- Сравнение производительности мобильных баз данных
- Практика использования
Когда юзабилити интерфейса становится проекцией качества сервисаLeonid Ivakhov
Презентация для World Usability Day Russia 2014.
Кейс рассказывает о том, как улучшение юзабилити одной точки контакта клиента с компанией помогло изменить отношение клиента к услугам компании в целом.
Surviving Technology 2009 & The ParalegalAubrey Owens
Talking technology with Paralegal Studies Students at J. Sargent Reynolds Community College on February 25, 2009. Using Software as a Solution for information mangament through trial presentation.
Defining a Legal Strategy ... The Value in Early Case AssessmentAubrey Owens
Early Case Assessment provides the framework for litigators to identify and analyze electronically stored information in response to a litigation hold and.or discovery request.
New AI-based analytics accelerate truth-finding missions along the typical dimensions: Who, When, Where, Why, What, How and How Much.
In this very practical webinar, Johannes Scholtes (ZyLAB) and Paul Starrett (licensed attorney and private investigator with extensive experience in high-profile investigations), will talk with Mary Mack (ACEDS) and illustrate how these techniques help legal professionals to speed up the eDiscovery process and improve the quality.
3. What is eDiscovery? Discovery in a litigation which deals with the exchange of information in an electronic format Referred to as Electronically Stored Information or ESI in the Federal Rules of Civil Procedure Amendments to the FRCP took effect in December, 2006 Certain mandatory requirements under Rule 26(f) Explicit class of discoverable materials named “Electronically Stored Information” (ESI) Some states beginning to follow the FRCP (39 states adopted similar requirements, including CA)
4. How much data? “Every two days we create as much information as we did from the dawn of civilization up until 2003.” Eric Schmidt, Google CEO Sept. 2010
5. How much data? April 2010 estimate: around 29.4 billion emails sent per day Approx. 350,000 emails per second
6. For example … Types: “Loose files”: Word, Excel, PDFs Email: Outlook PSTs, Lotus Notes, NSF (Lotus Notes), Gmail Databases Shared data: SharePoint, Wikis, Google docs Social Media: LinkedIn, Twitter, Facebook Where is it found? Computers, servers, the “cloud,” back-up tapes Smartphone, ipad, external HDs, flash drives
8. Preservation Litigation “holds” Why? Legal duty to preserve any potentially relevant or discoverable data Sanctions: Spoliation Qualcomm Zubulake v. UBS Warburg Identification and preservation ESI sources Computers, servers, cloud, smartphones, Back-up tapes: (FRCP vs. California Rules) “Accessible” or “inaccessible” sources
9. Another way to consider ESI Setup & Planning Collection Culling & Analysis Review Production Processing
97. Eamonn Markham, Esq. Eamonn is the General Counsel and a Discovery Consultant at SFL Data. About SFL Data: SFL Data is the first e-discovery service provider to deliver a fixed-price managed service that enables Fortune 500 corporate legal departments and law firms to gain a world-class e-discovery function without building it. The outcome – dramatically reduced litigation costs (over 50%), better control and visibility, and defensible results. SFL Data’s clients include Oracle, multiple other leading corporations, and more than 100 AmLaw 250 law firms. Proprietary processes, domain experts who’ve led IT and discovery at 7 law firms, testifying collections experts, best-in-class software, attorney-driven project management and an infrastructure for Fortune 50 corporations lead to clients sleeping at night and returning to us repeatedly.