September 30, 2021

Document Review in Today’s Pandemic

Legal departments rushed to transition their teams to work from home in order to adhere with the highest precautions.
June 4, 2020

Data Preservation and Spoliation: How to Maintain Security in a WFH Environment

By Joe Skalski Now that we’re well into the new work-from-home (WFH) norm, FRONTEO has been thinking about data preservation and spoliation. While we…
February 8, 2023

Cybersecurity part1

Global businesses have witnessed an unprecedented scale of cyberattacks in the past year making it increasingly challenging for security teams to react.
July 16, 2018

Know Before You Go: Tackling CJK Language Challenges in Cross-Border Matters

The two largest economies in Asia–China and Japan–historically have seen far lower volumes of eDiscovery than the U.S. However, with a growing global economy,
April 3, 2020

Secure Remote Review in Light of COVID-19

By leveraging Google Cloud’s secure environment, FRONTEO’s Managed Review offering has quickly and efficiently adapted to these challenging times by allowing document review on…
January 4, 2023

eDiscovery Market Growth Trends

Spending across the eDiscovery software and services market is estimated to total $14.05B in 2022, and continue increasing at a CAGR of approximately 9.69% towards $22.31B in 2027. This projected growth was taken from various leading eDiscovery publications, posts, data points, and discussions.
December 23, 2022

Growing Importance of In-House Counsel in Japan

The role of in-house counsel in Japan has evolved significantly over for the past few years as the reluctance to embrace the concept of in-house legal departments has changed — largely out of necessity.
July 24, 2020

Unusual Sources of Discoverable Data

Collecting electronically stored information (ESI) is a routine challenge for eDiscovery specialists, but one that’s becoming more and more complex as our technology environment evolves. The inherent difficulties of traditional ESI collection are compounded by…
February 16, 2023

Cybersecurity part2

Cyberattacks that use AI are currently rare and limited to social engineering applications, (such as impersonating an individual) or used in ways that aren’t directly observable by researchers and analysts. However, the quantity and quality of advances in AI have made more advanced cyberattacks likely in the foreseeable future.
June 25, 2018

Know Before You Go: Collections Complexities in Asia

As part of our series on Asia cross-border eDiscovery issues and best practices, in this post we provide an overview of the unique challenges…
December 14, 2022

E-Discovery in Australia: Part 3 – Privacy Laws Updates and Revisions

One consistent message that seems to resonate from legislature to legislature across the world is the recognition of the fact that data - especially personal data - is both a weapon and a vulnerability, and in the quickly-evolving digital landscape of today the task of safeguarding it effectively becomes more and more difficult. The Australian legislature seeks to update its current privacy laws, which are based on both the original 1988 Privacy Act, and its later update from 2000, to reflect the rapid technological advancements that took place in the early 21st century in data collection, data storage and data analysis.
May 15, 2023

Growing Importance of Information Governance in eDiscovery & Beyond

The legal industry is undergoing transformational changes as aspects of information governance and eDiscovery are refined with new data governance solutions and technologies to address evolving business and regulatory requirements.
October 14, 2021

New Cybersecurity Regulations in the PRC

Regulation of cyberspace and the ability to access personal user data is a global, sweeping phenomenon that is undergoing immense change. Countries and societies around the world have had to confront questions about: What is private? What is sacred? What rights do individuals have to privacy? Where should the ability of corporations to access personal user information begin and end?
July 25, 2018

New to Asian Language eDiscovery? Challenges posed by CJK

Economic integration in the ASEAN region, public investment, increased M&A activity, and the expansion of foreign and domestic multinational corporations are driving regional legal market…
October 26, 2021

Cybersecurity Month Article:2-Factor Authentication for Extra Safety

October is the 18th Annual National Cybersecurity Awareness Month in the United States. It is sponsored by the Cybersecurity and Infrastructure Security Agency and the National Cyber Security Alliance. This year’s theme is “Do Your Part. #BeCyberSmart.” Being Cyber Smart includes awareness of current threats like business email compromise (BEC), phishing, ransomware, and supply chain compromise.
October 24, 2019

Compliance programs for Asian corps

Last year, Maruyasu Industries, an auto parts manufacturer of steel tubes, was fined $12 million for its role in a criminal conspiracy to fix…
August 16, 2018

For eDiscovery Professionals, the GDPR Cloud Offers a Few Silver Linings

The new General Data Protection Regulations (known as GDPR) rules were agreed upon in Brussels in 2015 and took effect in May, 2018. GDPR…
December 25, 2023

South Korea’s Technology Protection Strategy of National Core Technologies

Global technology competition has grown fierce recently requiring nations to consider and enact technology protection policies and strategies. In Japan, for example, there was a significant change in 2014 under the Liberal Democratic Party that led to the development and passage of the Economic Security Promotion Act in 2022, along with a new National Security Strategy.
February 24, 2023

BYOD (Bring Your Own Device) Policy Considerations

Bring Your Own Device (BYOD) programs remain both a major opportunity and challenge for enterprises. It is possible to capitalize on the benefits of BYOD without adding significant risk by following the right approach to identifying BYOD risk and developing an effective BYOD policy.
January 7, 2020

We’re bringing Smarter AI to Legalweek New York 2020

Using Smarter AI via our KIBIT AI engine we then process your data set. This results in fewer documents, with greater relevance, for review. In turn, our clients spend significantly less time during the discovery review phase leveraging KIBIT Automator’s AI technology.