Public or Private? Legal and Operational Challenges of Social Media
In this clip, Jesse touches intelligently on the legal perspective of Social Media regarding Terms of service, Personal Injury, Sexual Harassment, Workplace Disabilities and Retention. Continue reading →
View ArticleWhat is “Predictive Coding”?
"Predictive Coding is not replacing the document review process, it's refining the documents that are then reviewed." --Adam Strayer, Director of eDiscovery Strategy at Complete Discovery Source...
View ArticleSuccess Through Senior Level Support in RIM
Panel Discussion topics with Michael S. McKenna and Kevin S. Joerling in this video: - RIM/IT/Legal Infrastructure - RIM Program Maturity and Key Components - Overall Approach to Electronic Records and...
View ArticleAll About “Big Data”
What is Big Data? "Big data usually includes data sets with sizes beyond the ability of commonly-used software tools to capture, curate, manage, and process the data within a tolerable elapsed time....
View ArticleIgnorance Is Not A Defense
Hon. Judge Scheindlin discusses, with Kenneth Withers, Esq., negligence and gross negligence, reasonable conduct, destruction of evidence, recklessness, willfulness and litigation holds, preservation,...
View ArticleAre You Preserving on a Broad Hold?
In this clip: Carol Stainbrook and Kenneth Withers discuss holds and the confusion between retention and preservation. Continue reading →
View ArticleA New Definition of Responsible Information Management
Karen Strong "Wordles" our future state and discusses a new definition of "Responsible Information Management." Continue reading →
View ArticleLet’s Be Chuck!
Today, most organizations have too much digital content that has outlived its usefulness. Every year, the quantity of this unusable content multiplies. So, there's no time like the present to get busy,...
View ArticleClassification and “Poisoning the Well”
In this clip, Bruce Miller: compares the job of the IT person and the records manager; “poisoning the well;" and the "straight line to storage hell." Continue reading →
View ArticleMistaken Litigation?
After wiping their laptop drives and destroying thumb drives of Company ABC, are Mr. Smith and Mr. Brown guilty of incurring costs to the Plaintiff? Continue reading →
View ArticleSocial Media Information: Permanent or Ephemeral?
How mindful are you of your corporate Facebook posts? Steven Teppler, co-chair of the ABA committee which discovers digital evidence, discusses social networking information in terms of “Records.”...
View ArticleAnalytics and Enterprise Knowledge
In this clip, Brian Tuemmler describes Enterprise Knowledge. He talks about figuring out what you have, what you need to do with it, and to know that there are tools to help you build an infrastructure...
View ArticleNo Password, No Job
Jesse raises questions surrounding Caselaw boundaries regarding prospective employers demanding your social media passwords as terms of your employment? Are those requests ethical? Legal? Is it ethical...
View ArticleThe MER Experience
We are Your Solution! Check out the MER 2013 conference schedule and see how it delivers what you need: the latest information on the legal, technical, and operational issues associated with the...
View ArticleCultural Challenges in Companies Addressing Structured Data Systems
Michael S. McKenna discusses change management strategy. Continue reading →
View ArticleA Snapshot: The MER Conference and Records Management
Check out this terrific overview of the MER Conference and managing electronic records compiled by Johnny Knox (@SpeakerJohnny)--Speaker for the Culture. Continue reading →
View ArticleHon. Judge Scheindlin Comments on Rules Amendment Process
Hon. Judge Scheindlin comments on a proposal outlined by Judge David Campbell, chair of the Civil Rules Advisory Committee, on the Rules Amendment Process, which includes preservation, punitive...
View ArticleNotification vs Approval Process
In this clip: Carol Stainbrook, Kenneth Withers, Hon. Craig B. Shaffer and Hon. Peter A. Flynn discuss approval processes, sign offs, pocket vetos and spoliation. Continue reading →
View ArticleOrganization Transformation
Follow on Twitter: @merconference Number 2! Speaker: Karen Strong We’re all in this together. Responsible Information Management takes into consideration the roles and responsibilities of every user...
View ArticleWin a Full Year of MER (2012) on RIM on Demand!
Did you register for MER ‘13? Leave a comment below with your story of why you chose to join us in Chicago this year for the 21st Annual MER Conference and you will have a chance at winning a full year...
View Article
More Pages to Explore .....