February 10, 2022

Leveraging AI on Supply Chain and its effect

There is seemingly no limit to the applications for Artificial Intelligence and to the great expectations (or potential threats) that many tech and business leaders have predicted for its applications. In July of 2021 Google CEO Sundar Pinchai reiterated his belief that the effects and use of AI will be more profound on the history of humanity than fire or electricity, and Tesla founder Elon Musk has warned that AI could lead to the next world war. Nuclear fission is a common comparison among commentators, both in AI’s potential uses and potential dangers.
February 10, 2020

Quantifying the Benefits of AI-Enhanced Review

Exploding data volumes coupled with high costs have made the search for affordable, fast, and defensible eDiscovery technology a top priority for legal professionals.
November 2, 2021

US and EU New Guidelines and Views on AI : Part2

This is an opinion piece by FRONTEO data scientist in response to the article “US and EU New Guidelines and Views on AI” published on October 20th.
March 23, 2020

Tackle Impossible Deadlines with KIBIT-Powered AI

The Challenge A team of two attorneys faced a tight budget and an even tighter deadline. Close of discovery loomed, and extensive document review…
June 16, 2020

The Courts and COVID-19: Effects on Constituents

Part 2 The second of a two-part post covers courts’ varied responses to the coronavirus (COVID-19) pandemic, the implications for different constituents, and what to…
August 1, 2018

CJK Indexing and Processing and Search, Oh My!

A previous post on Chinese, Japanese and Korean (CJK) related eDiscovery outlined the language and technical challenges presented by Asian language content. Once the…
September 15, 2021

Antitrust cases against GAFA

Antitrust against GAFA expected to continue in Biden administration (DOJ probes and lawsuits into GAFA)
December 14, 2022

E-Discovery in Australia: Part 3 – Privacy Laws Updates and Revisions

One consistent message that seems to resonate from legislature to legislature across the world is the recognition of the fact that data - especially personal data - is both a weapon and a vulnerability, and in the quickly-evolving digital landscape of today the task of safeguarding it effectively becomes more and more difficult. The Australian legislature seeks to update its current privacy laws, which are based on both the original 1988 Privacy Act, and its later update from 2000, to reflect the rapid technological advancements that took place in the early 21st century in data collection, data storage and data analysis.
April 18, 2020

FRONTEO Commences Drug Repositioning Research on Novel Coronavirus (COVID-19) Using Best-In-Class AI

At FRONTEO, we use our expertise and proprietary technology to deliver creative custom solutions for our partners and clients. For us, we build solutions…
July 9, 2018

Challenges of eDiscovery for FCPA Investigations in Japan

When discussion of bribery and corrupt business practices comes up, it’s common to think of China and Russia, and the high profile investigations in…
July 4, 2023

What is a Privilege Log?

Privilege logs are a critical component of eDiscovery that requires careful planning, analysis and detail in order to successfully complete. This process can be costly and time-consuming as specific requirements tend to vary by jurisdiction and on a case-by-case basis. As such, in this blog we would like to provide a brief overview of the privilege log process, discuss various privilege log types used today, and review how existing technologies can be leveraged to achieve efficiencies when constructing a privilege log.
February 16, 2023

Cybersecurity part2

Cyberattacks that use AI are currently rare and limited to social engineering applications, (such as impersonating an individual) or used in ways that aren’t directly observable by researchers and analysts. However, the quantity and quality of advances in AI have made more advanced cyberattacks likely in the foreseeable future.
March 12, 2020

eDiscovery & Data Management in a Changing Regulatory Environment

Parsing massive volumes of data for responsive documents within the often-restrictive timeframes imposed by litigation is challenging for any company. During eDiscovery, workflows must…
October 14, 2021

New Cybersecurity Regulations in the PRC

Regulation of cyberspace and the ability to access personal user data is a global, sweeping phenomenon that is undergoing immense change. Countries and societies around the world have had to confront questions about: What is private? What is sacred? What rights do individuals have to privacy? Where should the ability of corporations to access personal user information begin and end?
December 10, 2021

Cloud Computing Today and Beyond

Cloud Computing, or the ability to use software and data storage over the internet rather than on a local physical device, has greatly increased over the past several years, skyrocketed during the pandemic, and is predicted to continue growing into 2022.
September 30, 2021

Document Review in Today’s Pandemic

Legal departments rushed to transition their teams to work from home in order to adhere with the highest precautions.
May 7, 2023

Challenges with Messaging Apps & Related Data Retention Considerations

Messaging apps have become a ubiquitous form of communication, with billions of users worldwide. They have changed the way we communicate and share information with others in our personal lives and business, such that employees now routinely use messaging apps to conduct business. As the use of messaging apps has grown, so too has the need to collect data from these apps in a forensically sound manner from corporate-managed systems, as well as mobile devices for legal or investigatory reasons.
October 26, 2021

Cybersecurity Month Article:2-Factor Authentication for Extra Safety

October is the 18th Annual National Cybersecurity Awareness Month in the United States. It is sponsored by the Cybersecurity and Infrastructure Security Agency and the National Cyber Security Alliance. This year’s theme is “Do Your Part. #BeCyberSmart.” Being Cyber Smart includes awareness of current threats like business email compromise (BEC), phishing, ransomware, and supply chain compromise.
July 30, 2018

Corporate Counsel’s New Big Risk Factor: International Privacy Law and Compliance with U.S. Discovery and Investigation Requests

The ever-growing, complex web of privacy protection laws around the world directly impacts how multinational corporations can comply with demands to respond to a…
October 24, 2019

Compliance programs for Asian corps

Last year, Maruyasu Industries, an auto parts manufacturer of steel tubes, was fined $12 million for its role in a criminal conspiracy to fix…