This document discusses trends in social media, BYOD, big data, and the ethical considerations they raise for legal discovery. It notes that corporate data is doubling annually and most is now unstructured. BYOD leads to concerns about data security as personal devices contain work information. Courts are increasingly requiring production of social media data. Technology assisted review using tools like predictive coding can significantly reduce discovery costs compared to manual review while fulfilling lawyers' ethical obligations. Analytics require proper seed set generation, protocols, and oversight to protect clients.
The costly shortcomings_of_legacy_ediscovery_solutions (1)Shannalyn West
Over the past decade, the explosion in electronic data has driven huge demand for smarter, more efficient eDiscovery platforms. A recent survey asked ediscovery users about the source of their frustrations, and found that only 8% of legal professionals were satisfied with their eDiscovery technology. Legal professionals deserve better. Discover The Costly Shortcomings of Legacy Ediscovery Solutions
Ten steps for early awareness and relevance/non-relevance selectionJeffJohnson442
We are thrilled to share that Quantum authored a feature article for the October 2018 edition of the ACC Docket "Ten steps for early awareness and relevance/non-relevance selection” on page 8.
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB
This report provides a straightforward, pragmatic overview
about how legal professionals and organizations confronted with e-discovery must be able to interpret e-discovery
within the context of actual expected processes, inherent risks, and the available technical solutions that can
support relevant activities. Many people may have some
idea about what e-discovery is, at least thematically, but
many do not have a full appreciation of how to effectively
engage the setup and execution of the process. Even for
those who have gone through an e-discovery process
in the past, some of the acknowledged approaches to
e-discovery are outdated, particularly when viewed against
the current economic backdrop and the rapidly expanding
technical challenges found in most organizations and legal
firms.
The costly shortcomings_of_legacy_ediscovery_solutions (1)Shannalyn West
Over the past decade, the explosion in electronic data has driven huge demand for smarter, more efficient eDiscovery platforms. A recent survey asked ediscovery users about the source of their frustrations, and found that only 8% of legal professionals were satisfied with their eDiscovery technology. Legal professionals deserve better. Discover The Costly Shortcomings of Legacy Ediscovery Solutions
Ten steps for early awareness and relevance/non-relevance selectionJeffJohnson442
We are thrilled to share that Quantum authored a feature article for the October 2018 edition of the ACC Docket "Ten steps for early awareness and relevance/non-relevance selection” on page 8.
ZyLAB White Paper - Bringing e-Discovery In-houseZyLAB
This report provides a straightforward, pragmatic overview
about how legal professionals and organizations confronted with e-discovery must be able to interpret e-discovery
within the context of actual expected processes, inherent risks, and the available technical solutions that can
support relevant activities. Many people may have some
idea about what e-discovery is, at least thematically, but
many do not have a full appreciation of how to effectively
engage the setup and execution of the process. Even for
those who have gone through an e-discovery process
in the past, some of the acknowledged approaches to
e-discovery are outdated, particularly when viewed against
the current economic backdrop and the rapidly expanding
technical challenges found in most organizations and legal
firms.
5 Key Things to Know About eDiscovery and How to Implement Them in Your PracticeESI Attorneys LLC
A primer for attorneys, legal professionals, board members and business people on what to be aware of with digital information and the process of electronic discovery.
INSIDER'S PERSPECTIVE: Three Trends That Will Define the Next Horizon in Lega...LexisNexis
In a recent Information Today article, Sean Fitzpatrick of LexisNexis discusses trends that will define the future of legal research as we know it.
Humans create 2.5 quintillion bytes of data each day, and the cost of storing and maintaining each byte of data is declining. In fact, the growth of stored data is outpacing the ability of most people to manage it.
Powerful tools, such as natural language processing and machine learning, are helping professionals bridge the gap between information overload and the ability to harvest the power of Big Data.
Millennials now make up nearly one-third of the U.S. workforce and they are our most educated generation.
Tackling the ticking time bomb – Data Migration and the hidden risksHarley Capewell
Data migration is intrinsic to most big IT projects and yet
as an industry we have a poor record of tackling it.
If you are faced with responsibility for an IT project where
there will be some element of data migration then this
white paper written by industry expert Johny Morris will
help guide you past the pitfalls that await the unwary and
even how to add value as a consequence of performing
this necessary task.
A Non-Confidential Slide Deck for CSR-Support and its dba Cyber Support Solutions. We have a proprietary solution to stop Data Breaches and allow personal liberties from the same computer terminal.
Design and Implementation of algorithm for detecting sensitive data leakage i...dbpublications
A dangerous threat the organization meet today is data loss. Data loss may happen intentionally or unintentionally. Intentional data loss happens when authorized person intentionally deletes the file or program. In unintentional data loss happens when the user unknowingly or accidently delete the file. Data loss causes financial damage to the organization. This may be direct loss or indirect loss. The cost of data loss relates to the value of data and also the amount of time it is unavailable. Unavailability of data poses serious problem to the organization. To avoid sensitive data loss a multilevel security system is to be developed to protect those valuable data. It is essential to discover the data leakage as soon as possible. The purpose of the research is to detect the leakage of sensitive data when it moves in a network. Here we proposed efficient novel algorithm is implemented using fingerprint method for detecting sensitive data leakage in a network.
Improving Collaboration Through Identity ManagementGov BizCouncil
Driven by recent events and several White House and Congressional directives, federal agencies are focused on identity management like never before. With all this pressure, agency leaders face a difficult task ensuring secure access to agency resources by the right people, at the right time, and for the right reasons, without restricting the organization’s operational effectiveness.
The purpose of this paper is to review the topic of data breach from two perspectives: first, an overview of the trends in data breach litigation, and second, a more granular perspective of practical data protection processes that may serve as a guidepost to help reduce the risk of likelihood of data breach. Taken together the reader will understand why a measured approach to data protection can reduce the risk of financial liability from a data breach lawsuit.
Imprima is pleased to present How AI is changing legal due diligence, published in association with Mergermarket. With the introduction of artificial intelligence to the legal sector over the past few years, this technology has been gradually changing the way that legal due diligence is conducted.
Exploring these trends, Mergermarket, on behalf of Imprima, spoke with five experts from the fields of law and technology to share their insights on the day-to-day use of artificial intelligence in legal due diligence processes and how this might continue to develop.
Points of discussion include:
• Software solutions have allowed for greater efficiency in legal due diligence processes. Typical pain points associated with legal due diligence include the amount of time needed to both compile and review countless documents. AI can prove a useful tool to help streamline this process. However, there are limits to what current technologies can achieve.
• Emerging AI technology is met with increasing enthusiasm. Law firms are showing willingness to adopt AI processes into their practices. While this is not yet universal, some clients are beginning to expect law firms to use tech-enabled processes and be able to offer innovative solutions.
• Is AI causing permanent changes to the legal workforce? While the fears that AI technology would automate job roles, and lead to mass redundancies in legal firms proved unfounded, it is true that adoption of these technologies could lead to major changes in the legal sector. It is unlikely that the need for new lawyers will ever be fully eliminated – rather that the nature of their work may change, as AI technologies allow lawyers to shift their focus to higher-value work.
====.:GRUPO HOMEWORK:.====
SUCESSO!!!!! DE CADASTRO NA PRÉ LISTA!
CONFERÊNCIA DE LANÇAMENTO DO GRUPO COM O RENOMADO BENERSON TOP 1 DO BRASIL!
HOJE ÀS 20H00 VAMOS TER NOSSA PRIMEIRA REUNIÃO DE APRESENTAÇÃO!!!
http://login.meetcheap.com/conference,81836273
ENTRE ASSIM SEUNOME-C-ROMILDO
QUER INVESTIR 277 EUROS E GANHAR 500? MAIS DE 1500 REAIS!!
PAGAR COM CARTÃO DE CRÉDITO?
COM APENAS 6 PESSOAS NA MESA VOCÊ JÁ RECEBE!
INDICAÇÕES DIRETAS A VOCÊ !! PARA QUEM ESTIVER NA LISTA
DE PRÉ CADASTRO NO GRUPO! ISSO MESMO VAMOS COLOCAR
2 PESSOAS PARA VOCÊ ! E VOCÊ JÁ RECEBE 200 EUROS! APÓS
CICLAR MAIS 300 !!!!
VENHA AGORA NÃO PERCA TEMPO OU VAI FICAR NO FINAL DA FILA!
ME ADD NO SKYPE : ROMILDO-COSTA
OU INBOX (CHAT)
Romildo Costa
Skype: Romildo-Costa
E- mail:contato@grupohomework.com
Facebook: www.facebook.com/homework.brasil
Curta nossa Fã Page!
www.facebook.com/grupohomework
Tel.: (22) 8114-9440 TIM
Tel:. (21) 7711-8123 Nextel
Tel:. (21) 9557-9039 Vivo
Tel:. (22) 9238-4248 Claro
ID RÁDIO NEXTEL 682*24123
SEJA BEM VINDO!
5 Key Things to Know About eDiscovery and How to Implement Them in Your PracticeESI Attorneys LLC
A primer for attorneys, legal professionals, board members and business people on what to be aware of with digital information and the process of electronic discovery.
INSIDER'S PERSPECTIVE: Three Trends That Will Define the Next Horizon in Lega...LexisNexis
In a recent Information Today article, Sean Fitzpatrick of LexisNexis discusses trends that will define the future of legal research as we know it.
Humans create 2.5 quintillion bytes of data each day, and the cost of storing and maintaining each byte of data is declining. In fact, the growth of stored data is outpacing the ability of most people to manage it.
Powerful tools, such as natural language processing and machine learning, are helping professionals bridge the gap between information overload and the ability to harvest the power of Big Data.
Millennials now make up nearly one-third of the U.S. workforce and they are our most educated generation.
Tackling the ticking time bomb – Data Migration and the hidden risksHarley Capewell
Data migration is intrinsic to most big IT projects and yet
as an industry we have a poor record of tackling it.
If you are faced with responsibility for an IT project where
there will be some element of data migration then this
white paper written by industry expert Johny Morris will
help guide you past the pitfalls that await the unwary and
even how to add value as a consequence of performing
this necessary task.
A Non-Confidential Slide Deck for CSR-Support and its dba Cyber Support Solutions. We have a proprietary solution to stop Data Breaches and allow personal liberties from the same computer terminal.
Design and Implementation of algorithm for detecting sensitive data leakage i...dbpublications
A dangerous threat the organization meet today is data loss. Data loss may happen intentionally or unintentionally. Intentional data loss happens when authorized person intentionally deletes the file or program. In unintentional data loss happens when the user unknowingly or accidently delete the file. Data loss causes financial damage to the organization. This may be direct loss or indirect loss. The cost of data loss relates to the value of data and also the amount of time it is unavailable. Unavailability of data poses serious problem to the organization. To avoid sensitive data loss a multilevel security system is to be developed to protect those valuable data. It is essential to discover the data leakage as soon as possible. The purpose of the research is to detect the leakage of sensitive data when it moves in a network. Here we proposed efficient novel algorithm is implemented using fingerprint method for detecting sensitive data leakage in a network.
Improving Collaboration Through Identity ManagementGov BizCouncil
Driven by recent events and several White House and Congressional directives, federal agencies are focused on identity management like never before. With all this pressure, agency leaders face a difficult task ensuring secure access to agency resources by the right people, at the right time, and for the right reasons, without restricting the organization’s operational effectiveness.
The purpose of this paper is to review the topic of data breach from two perspectives: first, an overview of the trends in data breach litigation, and second, a more granular perspective of practical data protection processes that may serve as a guidepost to help reduce the risk of likelihood of data breach. Taken together the reader will understand why a measured approach to data protection can reduce the risk of financial liability from a data breach lawsuit.
Imprima is pleased to present How AI is changing legal due diligence, published in association with Mergermarket. With the introduction of artificial intelligence to the legal sector over the past few years, this technology has been gradually changing the way that legal due diligence is conducted.
Exploring these trends, Mergermarket, on behalf of Imprima, spoke with five experts from the fields of law and technology to share their insights on the day-to-day use of artificial intelligence in legal due diligence processes and how this might continue to develop.
Points of discussion include:
• Software solutions have allowed for greater efficiency in legal due diligence processes. Typical pain points associated with legal due diligence include the amount of time needed to both compile and review countless documents. AI can prove a useful tool to help streamline this process. However, there are limits to what current technologies can achieve.
• Emerging AI technology is met with increasing enthusiasm. Law firms are showing willingness to adopt AI processes into their practices. While this is not yet universal, some clients are beginning to expect law firms to use tech-enabled processes and be able to offer innovative solutions.
• Is AI causing permanent changes to the legal workforce? While the fears that AI technology would automate job roles, and lead to mass redundancies in legal firms proved unfounded, it is true that adoption of these technologies could lead to major changes in the legal sector. It is unlikely that the need for new lawyers will ever be fully eliminated – rather that the nature of their work may change, as AI technologies allow lawyers to shift their focus to higher-value work.
====.:GRUPO HOMEWORK:.====
SUCESSO!!!!! DE CADASTRO NA PRÉ LISTA!
CONFERÊNCIA DE LANÇAMENTO DO GRUPO COM O RENOMADO BENERSON TOP 1 DO BRASIL!
HOJE ÀS 20H00 VAMOS TER NOSSA PRIMEIRA REUNIÃO DE APRESENTAÇÃO!!!
http://login.meetcheap.com/conference,81836273
ENTRE ASSIM SEUNOME-C-ROMILDO
QUER INVESTIR 277 EUROS E GANHAR 500? MAIS DE 1500 REAIS!!
PAGAR COM CARTÃO DE CRÉDITO?
COM APENAS 6 PESSOAS NA MESA VOCÊ JÁ RECEBE!
INDICAÇÕES DIRETAS A VOCÊ !! PARA QUEM ESTIVER NA LISTA
DE PRÉ CADASTRO NO GRUPO! ISSO MESMO VAMOS COLOCAR
2 PESSOAS PARA VOCÊ ! E VOCÊ JÁ RECEBE 200 EUROS! APÓS
CICLAR MAIS 300 !!!!
VENHA AGORA NÃO PERCA TEMPO OU VAI FICAR NO FINAL DA FILA!
ME ADD NO SKYPE : ROMILDO-COSTA
OU INBOX (CHAT)
Romildo Costa
Skype: Romildo-Costa
E- mail:contato@grupohomework.com
Facebook: www.facebook.com/homework.brasil
Curta nossa Fã Page!
www.facebook.com/grupohomework
Tel.: (22) 8114-9440 TIM
Tel:. (21) 7711-8123 Nextel
Tel:. (21) 9557-9039 Vivo
Tel:. (22) 9238-4248 Claro
ID RÁDIO NEXTEL 682*24123
SEJA BEM VINDO!
A listening activity based on Rainforest Tocatta by Wendy Hiscocks. Suitable for Australian music topics for stage 5 or above. Has score excerpts and focus questions but unfortunately no audio.
A slideshow with score excerpts and musical excerpts. A listening activity based on John Peterson's Five Islands composition ideal for stage 5 learning under Australian Art Music in the NSW syllabus.
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
The Compliancy Group offers FREE HIPAA education with industry experts from across the industry. This months webinar with Axis Technology focuses on Health IT and the challenges that come with it. Register for our upcoming webinars at www.compliancy-group.com/webinar
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
Date Use Rules in Different Business Scenarios:It's All Contextual William Tanenbaum
All privacy is contextual. Like that, the legal rules for collecting, aggregating, sharing and protecting data, including through IP, are specific to the context. One size does not fit all.
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
Arent Fox LLP. Rules for data collection, aggregation, sharing, use and protection all depend on the business and legal context. One size does not fit all.
How'd we do in 2013 from a data breach perspective? As we close out the year, are the cupboards / budgets bare and will it be a lean holiday season? Or should we be budgeting a holiday celebration with all of the trappings and a sumptuous New Year?
Borrowing themes from the Charles Dickens holiday classic, this webinar will review industry statistics and other indicators to evaluate how we did in 2013 from a privacy breach and security incident response perspective. Will our mythical CSO and CPO get the Scrooge-like CFO to approve their budget increases? And what will 2014 hold from a security, privacy, and regulatory perspective? Register below to find out.
Our featured speakers for this Dickensian webinar will be:
- Ebenezer Scrooge, Chief Financial Officer, Acme Inc. played by Ted Julian, Chief Marketing Officer, Co3 Systems
- Bob Cratchit, Chief Privacy Officer, Acme Inc. played by Gant Redmon, General Counsel, Co3 Systems
- Tiny Tim, Chief Security Officer, Acme Inc. played by "Tiny" Tim Armstrong, Incident Response Specialist, Co3 Systems
Date Use Rules in Different Business Scenarios: It's All Contextual William Tanenbaum
Arent Fox LLP. Collecting, sharing, aggregating and using data in different business models and scenarios are subject to different rules and depend on the specific context
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
2. • 10 Billion Emails: What Did We Miss?
• BYOD: What You Don’t Know Can Hurt You
• @SocialMedia: Prsv & Rvw 4 #Dfense & #Winning
• The Game Changer: TAR/CAR
• Questions
2
4. The New Reality
• Corporate data is doubling
in size annually
• 80% of data unstructured
• 168,000,000 emails
transmitted every minute
• Average executive receives
300 emails each day
• 5 custodians = 2 ½ million
pages – the height of the
TransAmerica building
4
6. How much data could be on a phone?
• Smart phones start at 8 GB and go up to 64 GB
• Add a microSD card and you could carry 128
GB of storage in your pocket
6
0
200
400
600
800
1000
1200
1400
1600
8 GB 64 GB 128 GB
8. BYOD and Data Security
• Employers are concerned about data
– A study by network access solutions provider
Aruba Networks found that nearly 20 percent
of U.S. workers have not told their employers
that they use a personal mobile device for
work.
– Paul Luehr, managing director at Stroz
Friedberg, has seen a rise in BYOD data
breaches in his business, especially in
employment matters and trade secrets.
8
9. BYOD and Data Security
• Employers are concerned about data
– According to a recent survey, data loss is a
bigger priority than malware (75 percent
versus 47 percent).
– A lost or stolen mobile device consistently
ranks as the chief mobile security issue in
most studies.
9
10. BYOD and Data Security
• Employees are concerned about privacy
– According to ITBusinessEdge, 76% of respondents
would not give their employer access to view what
applications are installed on their personal device.
– 75% of respondents would not allow their employer
to install an app which gives the company the ability
to locate them during work and non-work hours.
– 82 percent are concerned to extremely concerned
about their employers tracking websites they
browse on personal devices during non-work time
10
11. Law Firms, Ethics, and BYOD
• Law firms have extra obligation:
• At employment law firm Dowling Aaron, they
understood the dangers of having some 50
attorneys carrying phones with access to client
documents but no passcode protection or wipe
capabilities.
• "If we end up on the front of the Fresno Bee
because an attorney left his phone at the bar...
the damage to your reputation could literally be
millions of dollars,“ explained CIO Darin Adcock.
11
12. Social Media, Cloud: Trends & Impact
• Discovery will only get broader as courts request
social media
Regas Christou, R.M.C. Holdings, LLC, d/b/a The
Church…d/b/a Funky Buddha Lounge, et al v. Beatport
LLC, Bradley Roulier, et al..
12
Impact: More data will need to be ingested
and processed, but less data can be culled
on key terms, increasing data growth.
13. Social Media, Cloud: Trends & Impact
• Discovery will only get broader as courts order
broad production of social media
E.E.O.C. v. Original Honeybaked Ham Co. of
Georgia, Inc., No. 11-cv-02560-MSK-MEH, 2012 WL
5430974 (D. Colo. Nov. 7, 2012)
13
Impact: Human reviewers will be needed to review
IMs, texts, and other social media which uses
abbreviations and shortcuts.
14. Social Media, Cloud: Trends & Impact
• Discovery will only get broader as courts request
social media
Theresa Giacchetto v. Patchogue-Medford Union Free
School District, No. CV 11–6323 (2013 WL 2897054
E.D.N.Y., May 6, 2013).
14
Impact: Counsel will need to spend more
time reviewing clients’ social media to
determine production or face sanctions.
15. Fulfilling Your Ethical Obligations
• Communication with Your Client
• Supervise the work
– Establish thorough review protocol
– Establish communication channel for questions
– Spot check review in initial stages
– Review privilege documents
15
Per article in Boston Bar
Journal, the outsourcing
lawyer retains the Rule
1.1 obligations.
16. Technology Solutions
16
Vendors can coordinate
and consolidate the
discovery process so
that the various phases
of eDiscovery are
managed consistently
and support the legal
strategy in each
case, but the lawyer is
still responsible.
17. Processing Solutions
Ingestion
All documents collected are loaded into
processing tool. Some documents might be
converted.
Preprocessing/Culling
DeNIST, Dedup,
Metadata Filters
Final processing
Keyterm filtering if any; prepare
docs for review tool
17
Thorough
processing
can reduce
data size from
30 – 90%
18. What is TAR/CAR?
• TAR = Technology Assisted
Review
• CAR = Computer Assisted
Review
• Predictive Coding =
computer actually tags
documents based on
algorithms or symantic
indexing
Get the right CAR!
18
20. Protecting Your Client with CAR
• Understand seed set generation
• Comprehensive ESI & Protective Order
• Clawback
• Analysis
• Due diligence on technology methodology
• Eyes on production set!
20
21. Courts embracing analytics and
predictive coding
EORHB, Inc. v. HOA Holdings, LLC, No. 7409-VCL (Del. Ch.
Oct. 15, 2012).
The Court instructs both parties to use predictive coding.
MAY 2013 UPDATE: Judge issues new order backing down!
Da Silva Moore v. Publicis Groupe & MSL Group, No. 11 Civ.
1279 (ALC) (AJP) (S.D.N.Y. Feb. 24, 2012). Note also that
non-responsive docs will be submitted to opposing.
Global Aerospace, Inc. v. Landow Aviation, L.P., No. CL
61040 (Vir. Cir. Ct. Apr. 23, 2012)
21
23. Managing Analytics
• Mixed messages on costs:
In re Aspartame Antitrust Litig., 817 F. Supp. 2d (E.D. Pa. 2011)
The court awarded costs for standard processing and hosting. The court
declined to award costs related to a “sophisticated e-discovery
program” as “squarely within the realm of costs that are not necessary”.
Gabriel Techs., Corp. v. Qualcomm, Inc., No. 08CV1992 AJB
(MDD), 2013 WL 410103 (S.D. Cal. Feb. 1, 2013)
Court awarded over $12 million in attorneys' fees for contract attorney
document review and use of Computer-Assisted Review, reasoning that
“CAR” was “more efficient and less-time consuming”.
23
24. Managing Analytics
• Mixed Messages on Costs (continued)
The Country Vintner of North Carolina, LLC v. E. & J. Gallo
Winery, Inc. No. 12-2074, April 29, 2013, US Court of
Appeals for Fourth Circuit
24
Published opinion affirmed strict definition of “making
copies”, and only awarded Gallo reimbursement of
$218.59 out of the $111,047.75 that they spent on
processing ESI.
25. Managing Analytics
• Analytics will significantly reduce the number of
documents to be reviewed, the highest % of
discovery costs†
• Parties will be expected to turn over all non-priv
docs from seed set, including non-responsive docs‡
• Helpful to have a vendor that provides flat fee for
analytics
25
26. In Conclusion…
• What are your “take aways” for:
BYOD?
Social Media and Cloud Data?
Technology and Computer Assisted Review?
• Questions?
26
27. Housekeeping
• Please sign the attendance sheet and include
your bar number
• Please complete the Evaluation Form at the
end of the presentation and return
27
Editor's Notes
Candice
Just 4 GB of data = 300,000 pages and 120 boxes, on the conservative side. I’ve seen estimates of 25K – 50K docs/GB.. Most corporate employees have at least 20 GB of data not including system files. Corporations without strict information governance polices can have employees with 6 different 15 GB PST files plus e-docs. If companies cannot control the volume of data going into the system, how can costs be controlled?
Just 4 GB of data = 300,000 pages and 120 boxes, on the conservative side. I’ve seen estimates of 25K – 50K docs/GB.. Most corporate employees have at least 20 GB of data not including system files. Corporations without strict information governance polices can have employees with 6 different 15 GB PST files plus e-docs. If companies cannot control the volume of data going into the system, how can costs be controlled? AND IT IS ALL DISCOVERABLE
How do you find all the data as well? Fake names are easy to create… see slide.
Apple iPhone, which is sold in 16 GB, 32 GB, and 64 GB models. Most sealed smartphones stick with the 16-, 32-, and 64-GB options… Per ___, “Samsung plans to sell the Galaxy S 4 in 16-, 32-, and 64-GB options, same as the iPhone. However, the S 4 also accepts microSD cards. The difference between the 16-GB model and the 64-GB model will probably be about $200 at the register. You can choose the 16-GB model, though, and pair it with a 64-GB card (totaling 80 GB of storage) for only about $50 more. Need more than 80 GB? Buy another card to supplement what you already have. If you want as much storage in your smartphone as you have in your laptop, pick the 64-GB model and pair it with a 64-GB microSD card. Having 128 GB in your pocket is kind of crazy, but it's certainly an option.” 8 GB = 126,32864 GB = 1,010,624 docs128 GB = 2,021,248. Two Eiffel Towers…
Intel infograph
Mobile malware may dominate headlines, but according to the recent LinkedIn Information Security Community survey of 1,600 IT administrators, data loss is a bigger priority in their organizations than malware (75 percent versus 47 percent). A lost or stolen mobile device consistently ranks as the chief mobile security issue in most studies.
More of survey:Business users expressed a great deal of concern about their employers looking into their lives. In fact, very few respondents expressed no concern.82 percent are concerned to extremely concerned about their employers tracking websites they browse on personal devices during non-work time 86 percent are concerned to extremely concerned about the unauthorized deletion of their personal pictures, music, and email profiles Only 15 percent are not at all concerned about employers tracking their location during non-work time Only 15 percent are not at all concerned about employers tracking personal apps installed on their devicesA study by network access solutions provider Aruba Networks revealed that BYOD , which is the term used for employees using personal smartphones and tablets for work purposes, is causing workers to be fearful of their employer checking out their personal information. Specifically, 45 percent of U.S. workers worry about giving their company's IT department access to their personal data, and 46 percent said they would feel violated if their IT staff were to access any personal information contained on their mobile devices.The research found that these concerns are leading many employees to keep their personal devices away from the IT department, thus putting company data at risk. Nearly 20 percent of U.S. workers have not told their employers that they use a personal mobile device for work."Employees resent the power their employers now wield over their personal data but are equally unconcerned about keeping company data safe," said Ben Gibson, chief marketing officer at Aruba Networks.
Adcock has had to take more drastic actions, even one aimed at a partner in the law firm. The attorney was sharing his iPad with his family, and they kept taking off the passcode. Adcock sent a friendly email reminder. On the next failed compliance check, Adcock had to selectively wipe the iPad per the BYOD policy.Top management compelled the attorney to comply with the BYOD policy in the future
Laura: Court ruled January 23, 2013 spoliation did occur because text messages were deleted and not produced.NEW CASE: Christou v Roulier. While defendant argued that text messages did not contain relevant messages, the Court determined that defense counsel did not review text messages to determine that first. Text messages were included in the legal hold language, and defendant had a duty to preserve. Per Court, “Plaintiffs may argue whatever inference they hope the jury will draw.” IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Judge R. Brooke Jackson Civil Action No. 10-cv-02912-RBJ-KMT
Laura: The Court ordered broad discovery of class members’ social media, text messages and email.E.E.O.C. v. Original Honeybaked Ham Co. of Georgia, Inc., No. 11-cv-02560-MSK-MEH, 2012 WL 5430974 (D. Colo. Nov. 7, 2012)In this case involving allegations of sexual harassment, a hostile environment and retaliation, the court granted in part Defendant’s Motion to Compel and ordered broad discovery of class members’ social media, text messages and email.NEW:Gatto v. United Air Lines, Inc., No. 10-cv-1090-ES-SCM, 2013 WL 1285285 (D.N.J. Mar. 25, 2013)In this personal injury action, the court imposed spoliation sanctions for Plaintiff’s failure to preserve his Facebook account.
Laura: The Court ordered limited discovery of plaintiff’s social media, including Facebook, Twitter, and MySpace.Quotes from Order: The fact that Defendant is seeking social networking information as opposed to traditional discovery materials does not change the Court's analysis. EEOC v. Simply Storage Mgmt., LLC, 270 F.R.D. 430, 434 (S.D.Ind.2010). The Court also notes that the “fact that the information [Defendant] seeks is in an electronic file as opposed to a file cabinet does not give [it] the right to rummage through the entire file.”The Federal Rules of Civil Procedure do not require a party to prove the existence of relevant material before requesting it.If the Court were to allow broad discovery of Plaintiff's social networking postings as part of the emotional distress inquiry, then there would be no principled reason to prevent discovery into every other personal communication the Plaintiff had or sent since alleged incident. As explained by Magistrate Judge Francis in Rozell v. Ross–Holst: *3 To be sure, anything that a person says or does might in some theoretical sense be reflective of her emotional state. But that is hardly justification for requiring the production of every thought she may have reduced to writing or, indeed, the deposition of everyone she might have talked to.The Court does find, however, find that certain limited social networking postings should be produced. First, Plaintiff must produce any specific references to the emotional distress she claims she suffered or treatment she received in connection with the incidents underlying her Amended Complaint... Moreover, in seeking emotional distress damages, Plaintiff has opened the door to discovery into other potential sources/causes of that distress. Thus, any postings on social networking websites that refer to an alternative potential stressor must also be produced. However, unfettered access to Plaintiff's social networking history will not be permitted simply because Plaintiff has a claim for emotional distress damages.First, the Court sees no basis at this time why Defendant should go through a third-party provider to access Plaintiff's social networking postings when Plaintiff has access to this information herself. Therefore, the Court directs that Plaintiffs postings be reviewed for relevance by Plaintiff's counsel and that Plaintiff's counsel—not Plaintiff—make a determination regarding the relevance of the postings, keeping in mind the broad scope of discovery contemplated under Rule 26.
All the bar rules insist on strict supervision of outsourced attorneys, whether US or non-US. Perform DUE DILIGENCE.
Laura: EDRM = Electronic Discovery Reference ModelIn re Porsche Cars N. Am., Inc. Plastic Coolant Tubes Prods. Liab. Litig., 2012 U.S. Dist. LEXIS 7999 (S.D. Ohio Jan. 24, 2012) (citing the N.D. Ohio Local Rule App. K Default Standard for Discovery of Electronically Stored Information). The Ohio federal court specifically noted, however, that notwithstanding the appointment of the discovery coordinators, the attorneys at “all times” will be “responsible for responding to e-discovery requests.” Id. at *18.Green v. Blitz U.S.A., Inc, No. 2:07-CV-372 (TJW), 2011 U.S. Dist. LEXIS 20353 (E.D. Tex. Mar. 1, 2011), the court swiftly issued sanctions against the defendant for failing to produce key emails regarding the subject flame arrester because it failed to do a simple search for “flame arrester,” which would have found relevant emails regarding a key issue in the products-liability litigation. The defendant shockingly placed an employee in charge of searching for and collecting documents for the litigation, who admitted that he was basically computer illiterate. Here, the court found a willful intent to destroy evidence and awarded sanctions involving a $250,000 payment to the plaintiff for the prejudice that occurred from the defendant’s discovery violations and conditionally awarded another $500,000 if the defendant did not produce the court’s decision to every plaintiff in every lawsuit it was defending or had defended in the past two years. The defendant was even ordered to file the court’s decision with its first pleading or filing in every future litigation for the next five years. Peerless Indus., Inc. v. Crimson AV, LLC, No. 1:11-cv-1768, 2013 WL 85378 (N.D. Ill. Jan. 8, 2013)In this case, the court concluded that Defendants’ reliance on a vendor to accomplish collections from a non-party whose documents were in Defendants’ control was “insufficient” and granted Plaintiff’s motion for sanctions. Specifically, the court ordered Defendants to “show that they in fact searched for the requested documents and, if those documents no longer exist or cannot be located," to "specifically verify what it is they cannot produce” and ordered Plaintiff to submit its costs related to preparation of the motion.Noting the Managing Director’s deposition testimony that “there was a process outlined ‘I guess by the vendor,’” the court concluded that Defendants “took a backseat approach” and “let the process proceed through a vendor.” As a result the Managing Director, “had no part in the process . . . .” was unable to answer questions about the non-party’s information systems, search efforts, custodians, preservation efforts, or whether any of Sycamore’s employees “were even contacted regarding plaintiff’s document requests.” The court concluded that “such a hands-off approach [wa]s insufficient.”
Can filter on custodian, date, file types (including system files), whatever…. Can use file inclusion or file exclusion for file type filtering. HOWEVER, must have entered agreement with opposing counsel and/or the court prior to eliminating certain file types, date ranges, or custodians from review. An ESI Agreement should be discussed in the 26(f) meet & confer, and per the FRCP the final plan should be submitted to the court. This includes: “requirement for disclosures under Rule 26(a), including astatement of when initial disclosures were made or will be made;(B) the subjects on which discovery may be needed, when discovery should be completed, and whether discovery should be conducted in phases or be limited to or focused on particular issues;(C) any issues about disclosure or discovery of electronically stored information, including the form or forms in which it should be produced;(D) any issues about claims of privilege or of protection as trial-preparation materials, including—if the parties agree on a procedure to assert these claims after production— whether to ask the court to include their agreement in an order;(E) what changes should be made in the limitations on discovery imposed under these rules or by local rule, and what other limitations should be imposed; and(F) any other orders that the court should issue under Rule 26(c) or under Rule 16(b) and (c).”
Laura: First, let’s note that “analytics” and “technology assisted review” or “computer assisted review” are not the same things predictive coding. Predictive Coding is a small subset that falls into TAR. Technology or computer assisted review can include concept clustering, email threading, even key term culling.Courts are even confusing names, with District Judge Battaglia using “computer assisted review” for predictive coding.
Note the never-ending circle in the process….
Laura:Seed set generated by “judgmental” sample or random sample, or combination? Both sides using same method?ESI agreement should be specific for CAR and include specific language on confidentiality. Spell out level of confidence and stability!Clawback for inadvertent production of privileged docs.Follow standard analysis recommended by EDRM and perform QC of both non-responsive and responsive docs.Several methods available now – algorithm? Symantic indexing? Active learning? Support vector? “Magic black box”? Most importantly, how is computer review “complete” – stability? Overturns? Error rate upon QC?Every doc that will be produced should have been reviewed by a human for privilege and issues, not to mention responsiveness validation. The theoretical savings are a result of not reviewing non-responsive docs.
Vice Chancellor J. Travis Laster in Delaware Chancery Court issued the bench order requiring both sides to use predictive coding and to use the same vendor. EORHB, Inc., et al v. HOA Holdings, LLC, C.A. No. 7409-VCL (Del. Ch. Oct. 15, 2012). This appears to be the first time a judge has required both sides of a dispute to use predictive coding when neither has asked for it. It may also be the first time a judge has ordered parties to use the same vendor. Quote: “The problem is that these types of indemnification claims can generate a huge amount of documents. That’s why I would really encourage you all, … it seems to me this is the type of non-expedited case where we could all benefit from some new technology use.” Classic case of judge getting ahead of himself without understanding document technology.UPDATE: Unpublished opinion, Order dated May 6: WHEREAS, the parties have agreed that, based on the low volume of relevant documents expected to be produced in discovery by EORHB, Inc., et al (collectively, “Plaintiffs”), the cost of using predictive coding assistance would likely be outweighed by any practical benefit of its use; WHEREAS, the parties have agreed that there is no need for the parties to use the same discovery review platform; WHEREAS, the requested modification of the Order will not prejudice any of the parties; … (i) Defendants may retain *** and its computer assisted review tools to conduct document review; (ii) Plaintiffs and Defendants shall not be required to retain a single discovery vendor to be used by both sides; and (iii) Plaintiffs may conduct document review using traditional methods.Judge Peck ruled in favor, noting: “That does not mean computer-assisted review must be used in all cases,… . What the Bar should take away from this Opinion is that computer-assisted review is an available tool and should be seriously considered for use in large-data-volume cases.” Note also that non-responsive docs will be submitted to opposing:“[a]ll of the documents that are reviewed as a function of the seed set, whether [they] are ultimately coded relevant or irrelevant, aside from privilege, will be turned over to” plaintiffs. (2/8/12 Conf. Tr. at 73.)Also note that in Nat’l Day Laborer Org. Network v. United States Immigration & Customs Enforcement Agency, --- F. Supp. 2d ---, 2012 WL 2878130 (S.D.N.Y. July 13, 2012), Judge Scheindlin was specifically addressing the adequacy of defendant’s search & collection efforts, but added: “*12 There are emerging best practices for dealing with these shortcomings and they are explained in detail elsewhere. There is a “need for careful thought, quality control, testing, and cooperation with opposing counsel in designing search terms or ‘keywords' to be used to produce emails or other electronically stored information.” And beyond the use of keyword search, parties can (and frequently should) rely on latent semantic indexing, statistical probability models, and machine learning tools to find responsive documents. Through iterative learning, these methods (known as “computer-assisted” or “predictive” coding) allow humans to teach computers what documents are and are not responsive to a particular FOIA or discovery request and they can significantly increase the effectiveness and efficiency of searches.” This clearly indicates Judge Scheindlin’s acceptance of predictive coding in her court.
Laura: A graphic interface can allow quick analysis of the most relevant custodians, and can inform counsel if a potentially key custodian was inadvertently missed. This is on point for both “trends” and “ethical considerations”:The trend is that more and more in-house and law firm companies are using analyticsEthically, you protect your discovery efforts by ensuring no custodian is missed, and you protect your client if they didn’t know about a particular “smoking gun” custodian. Additionally, you can promote faster settlement or even dismissal if you can demonstrate to opposing counsel that a particular custodian was NOT sending emails during a particular time period (especially in employment cases).
Laura: On Aspartame: “sophisticated e-discovery program” described as a “document review tool with visual clusteringAfter noting that the efforts of outside vendors had reduced the volume of potentially responsive documents by 87% as to one defendant and 38.5% as to another, the court stated: ” We therefore award costs for the creation of a litigation database, storage of data, imaging hard drives, keyword searches, deduplication, data extraction and processing. FN3 Because a privilege screen is simply a keyword search for potentially privileged documents, we award that cost as well. (Doc. No. 28 at 27). In addition, we award costs associated with hosting data that accrued after defendants produced documents to plaintiffs because, as the plaintiffs themselves acknowledged earlier in the proceedings, discovery was ongoing in this case up until summary judgment was issued. … We further award costs associated with the technical support necessary to complete these tasks, as other courts have done. We also side with the many courts that have taxed costs for optical character recognition (OCR), the process of making fixed images such as PDFs and TIFFs searchable. See, e.g., Race Tires Am., Inc. v. Hoosier Racing Tire Corp., No. 07–1294, 2011 U.S. Dist. LEXIS 48847, at *28–31 (W.D.Pa. May 6, 2011); Searchable documents are essential in a case of this complexity and benefit all parties. We additionally grant Holland Sweetener's $26,244.36 cost for “Production Processing Fee–Load File.” This cost covers the creation of load files that allow documents saved as TIFFs to be loaded onto review platforms.Rest of cost quote: …” which the court declared… falls “squarely within the realm of costs that are not necessary for litigation but rather are acquired for the convenience of counsel.”InGabriel Techs, the court notes that CAR was “reasonable under the circumstances” and found the requested about of $2,829,349.10 to be reasonable.
Laura:The judges relied on Race Tires America v Hoosier Racing Tire Corp, and the 2002 update to §1920(4) regarding reimbursement for “copies”. The only expenses approved were for TIFF and PDF production and CD copies. Judge Davis quoted the Committee appointed in 2002 to review §1920. “While the Committee ‘agreed that §1920 did not address many of the technology expenses” they were concerned “that the charges for these new expenses could dramatically expand the intention of the statute, which was to allow the taxing of costs in a very limited way.” Despite the fact that processing “copies” metadata, the court was not persuaded.
Laura:† Both Aspartame and Gabriel noted that large amounts of data that can be culled with analytics. Gabriel: Defendants provide the following explanation for the resulting fees: “Over the course of this litigation, Defendants collected almost 12,000,000 records-mostly in the form of Electronically Stored Information (ESI).... Rather than manually reviewing the huge volume of resultant records, Defendants paid H5 to employ its proprietary technology to sort these records into responsive and non-responsive documents.” (Defs. Mot., Doc. No. 332–1 at 26). After the algorithm determined whether documents were responsive or unresponsive to discovery requests, Black Letter attorneys reviewed the responsive documents for confidentiality, privilege, and relevance issues. (Id. at 26, n. 11.) For this reason, the review performed by H5 and Black Letter accomplished different objectives with the H5 electronic process minimizing the overall work for Black Letter. Again, the Court finds Cooley's decision to undertake a more efficient and less time-consuming method of document review to be reasonable under the circumstances. In this case, the nature of Plaintiffs' claims resulted in significant discovery and document production, and Cooley seemingly reduced the overall fees and attorney hours required by performing electronic document review at the outset. Thus, the Court finds the requested amount of $2,829,349.10 to be reasonable.See also Global Aerospace: While the order granting defendant’s request is one page, the defendant’s Memorandum in Support is over 156 pages, including exhibits. They note that technology assisted review can result in costs “1/100th of linear review”.‡ BothDe Silva MooreandGlobal Aerospace