January 20, 2021

Livingston vs. City of Chicago: What it means for eDiscovery

Technology Assisted Review (TAR) is now considered an essential tool in eDiscovery. Its popularity is, of course, closely tied to the increasing amounts of data used in litigation, especially when contrasted with the time, accuracy and cost of manual review.
June 4, 2020

Data Preservation and Spoliation: How to Maintain Security in a WFH Environment

By Joe Skalski Now that we’re well into the new work-from-home (WFH) norm, FRONTEO has been thinking about data preservation and spoliation. While we…
November 2, 2021

US and EU New Guidelines and Views on AI : Part2

This is an opinion piece by FRONTEO data scientist in response to the article “US and EU New Guidelines and Views on AI” published on October 20th.
July 9, 2018

Challenges of eDiscovery for FCPA Investigations in Japan

When discussion of bribery and corrupt business practices comes up, it’s common to think of China and Russia, and the high profile investigations in…
November 7, 2019

Considering the Impact of Richness on Control Set Metrics

A more thorough and introductory explanation of this topic was originally featured on the ACEDS Blog. Attorneys often calculate recall and precision estimates based…
March 12, 2020

eDiscovery & Data Management in a Changing Regulatory Environment

Parsing massive volumes of data for responsive documents within the often-restrictive timeframes imposed by litigation is challenging for any company. During eDiscovery, workflows must…
November 18, 2021

Legal Technology Has Record VC Investment In 2021

2021 has been a record year for legal tech: $1.4 billion was invested by venture capital firms in the first half of the year, which is more than in the entirety of 2020, and well above what was raised in 2018 and 2019. Leading the investment boom are startups like RocketLawyer (which provides legal services to individuals and small businesses), Verbit (voice transcription for the legal sector), Notarize (digital notarization), and Clio (cloud based CRM).
April 18, 2020

FRONTEO Commences Drug Repositioning Research on Novel Coronavirus (COVID-19) Using Best-In-Class AI

At FRONTEO, we use our expertise and proprietary technology to deliver creative custom solutions for our partners and clients. For us, we build solutions…
May 7, 2023

Challenges with Messaging Apps & Related Data Retention Considerations

Messaging apps have become a ubiquitous form of communication, with billions of users worldwide. They have changed the way we communicate and share information with others in our personal lives and business, such that employees now routinely use messaging apps to conduct business. As the use of messaging apps has grown, so too has the need to collect data from these apps in a forensically sound manner from corporate-managed systems, as well as mobile devices for legal or investigatory reasons.
July 25, 2018

New to Asian Language eDiscovery? Challenges posed by CJK

Economic integration in the ASEAN region, public investment, increased M&A activity, and the expansion of foreign and domestic multinational corporations are driving regional legal market…
October 26, 2021

Cybersecurity Month Article:2-Factor Authentication for Extra Safety

October is the 18th Annual National Cybersecurity Awareness Month in the United States. It is sponsored by the Cybersecurity and Infrastructure Security Agency and the National Cyber Security Alliance. This year’s theme is “Do Your Part. #BeCyberSmart.” Being Cyber Smart includes awareness of current threats like business email compromise (BEC), phishing, ransomware, and supply chain compromise.
January 24, 2017

The Ascent of Business Intelligence in the Legal Market; eDiscovery BI Research Findings

Search Google for the words “legal business intelligence” or “analytics for law firms.” Millions of blog entries, industry articles, and (of course) advertisements hype…
December 25, 2023

South Korea’s Technology Protection Strategy of National Core Technologies

Global technology competition has grown fierce recently requiring nations to consider and enact technology protection policies and strategies. In Japan, for example, there was a significant change in 2014 under the Liberal Democratic Party that led to the development and passage of the Economic Security Promotion Act in 2022, along with a new National Security Strategy.
October 20, 2021

US and EU New Guidelines and Views on AI

The U.S. Federal Trade Commission (FTC) and the European Commission (EC) have issued guidance and opinions on AI. This guidance provides insight into how organizations can mitigate concerns and prepare for the future when using AI.
April 3, 2020

Secure Remote Review in Light of COVID-19

By leveraging Google Cloud’s secure environment, FRONTEO’s Managed Review offering has quickly and efficiently adapted to these challenging times by allowing document review on…
September 30, 2021

Document Review in Today’s Pandemic

Legal departments rushed to transition their teams to work from home in order to adhere with the highest precautions.
July 16, 2018

Know Before You Go: Tackling CJK Language Challenges in Cross-Border Matters

The two largest economies in Asia–China and Japan–historically have seen far lower volumes of eDiscovery than the U.S. However, with a growing global economy,
November 26, 2021

Artificial Intelligence In The Life Sciences

Artificial Intelligence is a way of using technology to analyze large amounts of data in much less time than it would take a human user, and to make predictions based on this data that can be helpful for a variety of applications. Deep Blue’s legendary chess match against Kasparov is a classic example of AI and its ability to predict certain outcomes based on data.
August 5, 2020

With Remote the New Working Norm, What Does This Mean for the Litigation Cycle?

COVID-19 has changed the pattern of peoples’ lives worldwide, and it has faced the legal profession with its own unique set of challenges. Not only must the justice system…
July 4, 2023

What is a Privilege Log?

Privilege logs are a critical component of eDiscovery that requires careful planning, analysis and detail in order to successfully complete. This process can be costly and time-consuming as specific requirements tend to vary by jurisdiction and on a case-by-case basis. As such, in this blog we would like to provide a brief overview of the privilege log process, discuss various privilege log types used today, and review how existing technologies can be leveraged to achieve efficiencies when constructing a privilege log.