Remove tag sanctions
article thumbnail

Work Remotely Without Compromising Your Data

AIIM

Stop End-User Tagging: For too long, end-user tagging has been the primary means by which most companies classify files that contain sensitive, proprietary, or regulated data. Leave Legacy Servers Behind: Get rid of non-sanctioned apps and servers that are vulnerable to hacks. Not knowing is simply no longer an option.

article thumbnail

Kelly Twigger of ESI Attorneys: eDiscovery Trends 2018

eDiscovery Daily

The case law has been aplenty already for 2018 – as of March 24, we have 192 discovery decisions from across the country in the database, all tagged and able to be sorted by eDiscovery issue (think proportionality, social media, form of production, sanctions, etc.). That varies by organization.