Information Governance (InfoGovernance) is the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archiving and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information to enable an organization to achieve its goals. Information governance should be an element in planning an enterprise's information architecture.

(Gartner Hype Cycle for Legal and Regulatory Information Governance, 2009, December 2009).

An Engagement Area (EA) is an area where the commander of a military force intends to contain and destroy an enemy force with the massed effects of all available weapons systems.

(FM 1-02, Operational Terms and Graphics, September 2004).

Wednesday, October 1, 2014

Chasing Data: An eDiscovery Report

By Shane Schick
Extract: Choosing an e-discovery solution means addressing several interconnected issues. Product demos can be impressive, but don’t be fooled: a tool’s features can be the least important factor for you to consider. KPMG Canada’s Dominic Jaar, partner and national practice leader, information management services, and David Sharpe, manager of e-discovery, offer some key questions you should endeavour to answer while exploring solutions.

Tuesday, September 30, 2014

Total Review Cost of Training Selection Methods

By William Webber
My previous post described in some detail the conditions of finite population annotation that apply to e-discovery. To summarize, what we care about (or at least should care about) is not maximizing classifier accuracy in itself, but minimizing the total cost of achieving a target level of recall. The predominant cost in the review stage is that of having human experts train the classifier, and of having human reviewers review the documents that the classifier predicts as responsive. Each relevant document found in training is one fewer that must be looked at in review. Therefore, training example selection methods [...]

Monday, September 29, 2014

Is the IRS’s Inability to Find Emails the Result of Unethical Behavior?

By Ralph Losey
The IRS seems inherently incapable of finding emails. The most famous incident that everyone has heard about, and many have complained about, is the loss of emails of key witnesses in a Congressional investigation of the IRS tea party targeting scandal . In June 2014 the IRS admitted that it could not find many of the emails of the key witness, Lois Lerner. Lerner is the first IRS official to admit that agents had improperly scrutinized tax exempt applications. When she was subpoenaed to testify before Congress, she plead the Fifth Amendment and refused to answer any questions. She is not the only IRS official [...]

Friday, September 26, 2014

Email Remediation Step 2: Intradeduping Embedded Emails

By John Martin

BeyondRecognition (BR) is a technology company that enables data-driven information governance.
The first step in email remediation, faceted deduplication, involves comparing entire objects, either message attachment groups or attachments, to see if they matched at the whole object level. This posting focuses on the second step, intradeduping embedded emails, which involves identifying where earlier emails are included within or embedded in later emails. This is an iterative process starting with the smallest emails and continuing until the remaining emails are not embedded in or included in later emails.

Trademark Infringement in Blogging? (Cartoon and Clip)

Keeping up with the many comments and commentators in the data discovery and governance blogosphere can be quite challenging given the multitude of information, opinion and news blogs. This week’s cartoon and clip features a unique challenge to today’s bloggers  (cartoon) and a non-all inclusive running list of approximately 30 recent and relevant eDiscovery and information governance related blog posts (clip).

Click here to find running listing of the approximately 30 recent and relevant eDiscovery and information governance blog posts as shared on the ComplexDiscovery blog.

Thursday, September 25, 2014

At That Time: The Dynamo Case on Predictive Coding

By Hal Marcus
On September 16, I posted about the impact of timing on predictive coding in light of recent caselaw. Timing indeed being everything, an intriguing new opinion on this point was handed down the very next day. In Dynamo Holdings v. Comm’r , the IRS Commissioner sought to compel production of the contents of backup tapes containing at least several million documents. It objected to the producing parties’ request to use predictive coding to review them, calling it an “unproven technology.” In his opinion, Judge Ronald Buch rejects the IRS’ motion, detailing the substantial judicial and industry acceptance of predictive coding. He emphasizes the discretion that producing parties have in conducting document review, bluntly questioning why the use of predictive coding should even be before the court [...]

Wednesday, September 24, 2014

Faceted Deduplication in Email Remediation

By John Martin
There are three completely automated steps that can be used to remediate or reduce the volume of emails retained by an organization:
  1. Faceted deduplication
  2. Intradeduping embedded emails
  3. Payload analysis
This posting focuses on faceted deduplication. While every collection of emails varies, faceted deduplication, by itself, can achieve about 80% reduction in storage space used by emails and attachments.
The overall goal of a remediation program is to reduce the volume of objects that have to be managed and the level of resources required to manage them. No one has discovered a single [...]