Read All Posts »

Using reporting and analytics software, your internal teams can assemble and analyze organizational data to identify key details from data sets before outside counsel is brought in for eDiscovery.  When was the last time you looked closely at your organization’s unstructured data? What insights did you gain that you used to inform business decisions? If […]

We asked information professionals two questions regarding policy enforcement and eDiscovery. Have you been tasked with enforcing a policy directive? How many total hours/week does your team spend on eDiscovery? More than 115 people from eight different industries responded. From those responses, we created an infographic of the results. Click on the image below to […]

In today’s technology-driven world, many tasks have become automated.  From electronic bill payments to monitoring home surveillance and online shopping, automated processes have made our lives more efficient and allow us to spend time on other tasks.  When it comes to policy management though, is it better to automate the processes or continue to do […]

eDiscovery Goes Virtual

by Doug Yarabinetz on September 23, 2015

Large enterprises are no stranger to eDiscovery.  Whether it’s because of their sheer size, complexity, or the compliance demands their specific industry dictates, eDiscovery is an ongoing process that is so common, it is embedded within their core DNA.  These large organizations often have eDiscovery departments entirely dedicated to responding to eDiscovery requests initiated by […]

Altitude IG September Updates

by Rick Wilson on September 17, 2015

The Altitude IG September update introduces new features for the eDiscovery, Reporting & Analytics and Policy modules as well as some administration updates. The following list details the changes in each area: eDiscovery Module Updates Added an option to exclude particular labels when creating an eDiscovery collection (i.e. “collect all but the results labeled Privileged”) Added the ability for each user […]

Mail Attender for Windows, Sherpa’s mailbox and PST management and migration solution, has many uses. One of its more common uses is to locate documents that meet some age criteria and either delete or archive them. Typically, these types of Rules specifically target email messages, but occasionally the Rules are pointed at Calendar entries as […]