The Dodd-Frank Act of 2010 poses the largest comprehensive information governance (IG) challenge to corporations since the Sarbanes-Oxley
Act of 2002 (SOX). As new Dodd-Frank mandated rules are adopted financial institutions and public corporations alike will face a confusing array of new
rules and regulatory requirements. This eDJ Research Report helps to explain these new rules and requirements.
Uncertain about the meaning of recall, precision, and F-measure? Fear Not! Simple definitions and examples of these key predictive coding metrics will help boost your acumen.
Learn how Transparent Predictive Coding provides a new level of visibility into the predictive coding process and ensures unmatched defensibility during document review.
Learn more about Symantec's comprehensive approach to defensible deletion which reduces the storage costs and legal risks associated with the retention of electronically stored information.
This report provides key survey highlights and presents an overview of the challenges that organizations may face if they fail to implement an effective information retention strategy.
Understand how targeted collection can defensibly reduce data volumes at the beginning of each matter so less time and money is spent on downstream data processing and attorney review.
Read about eDiscovery best practices based on real-world cases and see how customers have met their eDiscovery challenges.
Learn how an effective and defensible legal hold workflow addresses the burden of legacy legal hold methods and mitigates risk.
Explore how Symantec’s transparent concept search technology provides the advantages of traditional concept searching while reducing eDiscovery expenses.
Examine the impact of Practice Direction 31 and recent high profile e-disclosure cases in the UK, and what actions are required to meet the requirements of the law proportionately and cost-effectively.
Understand how corporate investigators are examining existing workflows and searching for ways to immediately get to the heart of investigations using simple, efficient methodologies.
Learn about key defensibility requirements from five critical cases and how legal practitioners can address their most fundamental risk management task.
Read how the Amended Federal Rules can be distilled into four key implications for electronic discovery and what steps companies should take to meet the guidelines.