Remove e-Discovery Remove Education Remove Examples Remove Manufacturing
article thumbnail

University of Florida Brings eDiscovery Teachings to a Chinese University: eDiscovery Best Practices

eDiscovery Daily

discovery obligations, but also understand the methodologies and technologies associated with managing eDiscovery. William Hamilton, legal skills professor and executive director of the University of Florida’s E-Discovery Project, led the course, which took place at Southeast University during the last two weeks of August.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

For example, Amazon reminds customers to reorder their most often-purchased products, and shows them related products or suggestions. For example, a supply-chain function can use algorithms to predict future needs and the time products need to be shipped for timely arrival. Routine questions from staff can be quickly answered using AI.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anonymization & Pseudonymization as Tools for Cross-Border Discovery Compliance

ARMA International

discovery demands against the requirements of Europe’s General Data Protection Regulation (GDPR). discovery and international privacy rules. For example, mass pseudonymization or anonymization of records prior to any reviews or cross-border transfers can be a part of the solution. Introduction. See, inter alia , Laydon v.

article thumbnail

Infosource Global Capture & IDP Vertical Market Analysis 2022-2023 Update

Info Source

For example, organisations in the Legal and Retail sector may see impressive ROIs. These solutions are designed to acquire, classify, validate, and convert business inputs into valuable data for use in business transactions, analytics, records management, discovery, and compliance applications.

article thumbnail

The DHS Cybersecurity Strategy: Five Pillars of Cybersecurity Goals

Thales Cloud Protection & Licensing

The first pillar involves the discovery and understanding of the ever-evolving cyberthreat environment, and the second flows into vulnerability and threat reduction. We need to encourage manufacturers and suppliers to create “trusted” products that are secure and come from secure supply chains.

article thumbnail

Jason R. Baron of Drinker Biddle & Reath LLP: eDiscovery Trends 2018

eDiscovery Daily

Five years ago, we saw the emergence of one form of AI in the guise of technology-assisted review in e-discovery. So, there’s the question of liability, i.e., whether the software developer or manufacturer are held to a standard of strict liability, and what kind of ethical considerations are involved. You see it everywhere.

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

A fascinating example for me is that while most of the world was busy building out telephone communications infrastructure, the Soviets chose to focus on installing loudspeakers everywhere. Email in the enterprise is closely monitored and lives forever – the ‘paper trail’ it leaves is valuable for legal discovery and disciplinary action.