The more things change, the more they stay the same.
The 2014 edition of the Gartner e-Discovery Software market report was recently released. It contained few surprises, confirming what many people felt was a rather flat year of innovation in the e-discovery software universe.
No new players were added this year, and most vendors remained in approximately the same position they were in last year. A couple of vendors did improve a bit in the “ability to execute” and “completeness of vision” areas, but the major swings viewed a few years ago are absent this year.
e-discovery software is maturing. Most major vendors now incorporate some form of TAR analytics, and user interfaces have developed to the point where most users can learn to use a product in a couple of hours. Gone are the days of memorizing keystrokes and wading through menus to find a function.
Likewise, most vendors have recognized that support is as important as product, and have invested in customer assistance. Pricing models, while still varied, have started to coalesce into a volume and user license standard.
The report can be viewed here:
On August 21, 2014, Susan Wortzman will co-chair with the Honourable Justice Colin Campbell the Sedona Canada Working Group 7 (“WG7″) Meeting in Toronto. The focus of the meeting is to discuss and finalize updates to the Sedona Canada Principles Addressing Electronic Discovery, which will be released for public comment this Fall. WG7 will also discuss recent case law and evolving best practices for eDiscovery compliance, including topics such as the application of proportionality to ESI, privacy and data security issues and e-discovery, and TAR. A not to miss event for e-discovery practitioners in Canada.
In January, 2013, the Law Times reported that a bookkeeper at a law firm in Ontario was tricked into giving fraudsters access to trust accounts, resulting in “a large six-figure” amount being stolen. The bookkeeper received an email, clicked on a link, and downloaded a virus to her computer that gave the fraudsters the information they needed. This type of hack is commonly called ‘phishing’.
This week, the Globe and Mail reported that, last December, 37% of the 5,000 employees at the federal Justice department fell for a phishing scam test initiated by the department’s internal computer security group.
According to that article, phishing accounts for the illegal capture of “80,000 credit-card numbers, bank accounts, passwords and other confidential information every day”, and that “one million Canadians have entered personal banking details on a site they don’t know”.
TIPS to protect against phishing:
1) Be suspicious of any email or text message containing urgent requests for personal or financial information – financial institutions and credit card companies normally will not use email to confirm an existing client’s information.
2) Check the website’s address line to verify if it displays something different from the address mentioned in the email.