<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>edisclosure myth or reality? &#187; FRCP</title>
	<atom:link href="https://jollyvip.com/edisclosure/category/rulesdirections/frcp/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/edisclosure</link>
	<description>From litigation to the arbitration regime</description>
	<lastBuildDate>Tue, 01 Jul 2025 10:14:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>Not just ESI</title>
		<link>https://jollyvip.com/edisclosure/2014/01/24/esi/</link>
		<comments>https://jollyvip.com/edisclosure/2014/01/24/esi/#comments</comments>
		<pubDate>Fri, 24 Jan 2014 14:50:59 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2014]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Rules/Directions]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[aceds.org]]></category>
		<category><![CDATA[ESI]]></category>
		<category><![CDATA[FRCP 37(e)]]></category>

		<guid isPermaLink="false">http://jollyvip.com/edisclosure/?p=513</guid>
		<description><![CDATA[The US Federal Rule of Civil Procedure (FRCP) 37(e) &#8211; on preservation, is pending revision. Note the commentary at aceds.org. Preservation orders and the rules on Electronically Stored Information (ESI) are complex areas for policy makers and also IT folks. Some of these issues I have raised in my article and also briefly during my [...]]]></description>
			<content:encoded><![CDATA[<p>The US Federal Rule of Civil Procedure (FRCP) 37(e) &#8211; on preservation, is pending revision. Note the commentary at <a href="http://www.aceds.org/preservation-rule-change-may-ease-data-burden-but-also-invite-sloppiness-foul-play/" title="aceds.org" target="_blank">aceds.org</a>.</p>
<p>Preservation orders and the rules on Electronically Stored Information (ESI) are complex areas for policy makers and also IT folks. Some of these issues I have raised in my article and also briefly during my talk at BCS in November 2011. Both these are available on this <a href="http://jollyvip.com/edisclosure/contribution/" title="contribution" target="_blank">page.</a>  </p>
<p>Personally I find the term, ESI a confusing term in the context of electronic discovery/disclosure (edisc). In edisc it is not only the digital/electronic information in storage that the rules/laws are addressing. The word &#8216;stored&#8217; implies storage media/medium/devices and the data in storage is &#8216;at rest&#8217;. Hard to imagine that emails are ESI. In my talk I stated that edisc folks tend to address edisc by talking about discoverable media/medium/devices which is not the case in edisc. So now the proposed FRCP is addressing &#8216;discoverable information&#8217; instead of just ESI.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2014/01/24/esi/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>over 900 US cases</title>
		<link>https://jollyvip.com/edisclosure/2009/02/26/over-900-us-cases/</link>
		<comments>https://jollyvip.com/edisclosure/2009/02/26/over-900-us-cases/#comments</comments>
		<pubDate>Thu, 26 Feb 2009 01:42:31 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2009]]></category>
		<category><![CDATA[Case Management]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[ediscovery database]]></category>
		<category><![CDATA[K&L Gates]]></category>
		<category><![CDATA[US cases]]></category>

		<guid isPermaLink="false">http://iedisc.com/2009/02/26/over-900-us-cases/</guid>
		<description><![CDATA[I came across this electronic discovery database and wondered if there is a similar database for non US cases. I will continue to search for non US cases. For information, the electronic discovery database is maintained by K&#38;L Gates and here&#8217;s the blurb: &#8220;Electronic Discovery Case Database  K&#38;L Gates maintains and continually updates a database [...]]]></description>
			<content:encoded><![CDATA[<p>I came across this <a href="https://extranet1.klgates.com/ediscovery/">electronic discovery database </a>and wondered if there is a similar database for non US cases. I will continue to search for non US cases.</p>
<p>For information, the electronic discovery database is maintained by K&amp;L Gates and here&#8217;s the blurb:</p>
<p><em>&#8220;Electronic Discovery Case Database  												 											 											 												 													K&amp;L Gates maintains and continually updates a database containing over 900  													electronic discovery cases collected from state and federal jurisdictions around  													the United States.  This database is searchable by keyword, as well as by any  													combination of 28 different case attributes, e.g., on-site inspection, allegations  													of spoliation, motion for a preservation order, etc.  Each search will produce a  													list of relevant cases, including a brief description of the nature and disposition of  													each case, the electronic evidence involved and a link to a more detailed case summary if available.&#8221;</em></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2009/02/26/over-900-us-cases/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>a newly coined word &#8211; protodigital</title>
		<link>https://jollyvip.com/edisclosure/2008/12/09/a-newly-coined-word-protodigital/</link>
		<comments>https://jollyvip.com/edisclosure/2008/12/09/a-newly-coined-word-protodigital/#comments</comments>
		<pubDate>Tue, 09 Dec 2008 22:25:47 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Collaboration]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[lawyers]]></category>
		<category><![CDATA[protodigital]]></category>
		<category><![CDATA[Ralph's blog]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=165</guid>
		<description><![CDATA[Checkout Ralph&#8217;s blog on Why E-Discovery is Ruining Litigation in America and What Can Be Done About It In the world of IT and wearing my project manager hat on, ediscovery/edisclosure is another &#8216;activity&#8217; to add to the list of items to consider. In the past (before ediscovery/edisclosure is coined) and in projects I have [...]]]></description>
			<content:encoded><![CDATA[<p>Checkout Ralph&#8217;s blog on <em><span style="font-size: 10pt;color: #333333"><a href="http://ralphlosey.wordpress.com/2008/12/07/why-e-discovery-is-ruining-litigation-in-america-and-what-can-be-done-about-it%e2%80%a8%e2%80%a8/" title="Permanent Link: Why E-Discovery is Ruining Litigation in America and What Can Be Done About It? "><span style="font-family: 'Arial','sans-serif'">Why E-Discovery is Ruining Litigation in America and What Can Be Done About It</span></a></span></em></p>
<p>In the world of IT and wearing my project manager hat on, ediscovery/edisclosure is another &#8216;activity&#8217; to add to the list of items to consider. In the past (before ediscovery/edisclosure is coined) and in projects I have been involved in, I will do &#8216;cultural sensitivity&#8217; sensing and &#8216;who is who&#8217; and &#8216;who knows what or their role etc&#8217; (the word coined is stakeholder analysis). I have held workshops (e.g. internet banking projects) whereby lawyers were invited as &#8216;key stakeholders&#8217; and IT people were doing &#8216;who knows what&#8217;.  Guess what were the outcomes? Lawyers may know a lot but they generally don&#8217;t want to reveal or share &#8216;openly&#8217; in a workshop. If they do reveal or share, there will be more meetings with several paper memo type exchanges.</p>
<p>What can be done to improve collaboration between lawyers and IT people?  Before attempting collaboration, both teams need to sense &#8216;who is who&#8217; (not only the IT people) and whether they can deal with whatever the outcomes and learn to accept whatever the consequences.  (fear of being open?) I don&#8217;t know any rule books or processes to do this. It&#8217;s beyond reckoning&#8230; Like some people just can&#8217;t ride a bike no matter how many books they have read or seen. This is just my sudden reckoning!</p>
<p>I like the word, protodigital. I would like it better if this word can be a mantra for lawyers and IT folks to get to know &#8216;who is who&#8217; to reach to &#8216;who knows what&#8217;.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/12/09/a-newly-coined-word-protodigital/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>fear of the ediscovery costs&#8230;</title>
		<link>https://jollyvip.com/edisclosure/2008/10/06/fear-of-the-ediscovery-costs/</link>
		<comments>https://jollyvip.com/edisclosure/2008/10/06/fear-of-the-ediscovery-costs/#comments</comments>
		<pubDate>Mon, 06 Oct 2008 01:29:08 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[FRCP]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[Case]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=155</guid>
		<description><![CDATA[I am catching up on my e-mail alerts and came across an article in the Economist dated 28th August 2008 (that&#8217;s when I was away from my computer in sunny Hawaii!). The article titled &#8216;The Big Data Dump&#8217;. Great title for an article that touches on pretty much the reality of life from technology, business [...]]]></description>
			<content:encoded><![CDATA[<p>I am catching up on my e-mail alerts and came across an article in the <a href="http://www.economist.com/business/displaystory.cfm?story_id=12010377">Economist</a> dated 28th August 2008 (that&#8217;s when I was away from my computer in sunny Hawaii!).</p>
<p>The article titled &#8216;The Big Data Dump&#8217;. Great title for an article that touches on pretty much the reality of life from technology, business and from the kids to the big boys to the Supreme Court.</p>
<p>Well the  &#8216;dumping&#8217; also extended to changing the law (American Civil Law) or some new rules. Ms Love Kourlis&#8217;s quoted in the article : &#8216;Judges in civil cases, she says, need more power to assess and define the appropriate amount of information that can be sought in each case. Civil cases ought to require both sides to disclose what information they have, as in criminal cases, thus ending the game of hide-and-seek that makes both parties ask for more, for fear of missing something. And shifting lawyers away from being paid by the hour (see <a href="http://www.economist.com/business/displaystory.cfm?story_id=12010385">article</a>) would mean that they no longer had an incentive to add to the process.&#8217;</p>
<p>So what next?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/10/06/fear-of-the-ediscovery-costs/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>e-book on e-discovery</title>
		<link>https://jollyvip.com/edisclosure/2008/09/18/e-book-on-e-discovery/</link>
		<comments>https://jollyvip.com/edisclosure/2008/09/18/e-book-on-e-discovery/#comments</comments>
		<pubDate>Thu, 18 Sep 2008 21:10:27 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[CYA]]></category>
		<category><![CDATA[e-book]]></category>
		<category><![CDATA[IBM]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=147</guid>
		<description><![CDATA[Found an e-book style presentation on e-discovery. Just the same old content i.e. the US stuff on the FRCP, e-mails, retention policy, technological tools for search and guides etc. Flip through the nice charts and the articles and go straight to pages 20-21. Spot anything interesting? BTW you can also download a pdf version, how [...]]]></description>
			<content:encoded><![CDATA[<p class="MsoNormal"><span style="text-decoration: none">Found an <a href="http://www.internetevolution.com/ebook/ebookibm3/index.html"><span style="text-decoration: none">e-book style presentation</span></a> on e-discovery. </span></p>
<p class="MsoNormal"><span style="text-decoration: none">Just the same old content i.e. the US stuff on the FRCP, e-mails, retention policy, technological tools for search and guides etc.</span></p>
<p class="MsoNormal"><span style="text-decoration: none">Flip through the nice charts and the articles and go straight to pages 20-21. Spot anything interesting? BTW you can also download a pdf version, how cool… Also the reader is reminded on IBM on every page.</span><span style="font-family: Wingdings;text-decoration: none"><span></span></span><span style="text-decoration: none"></span></p>
<p class="MsoNormal"><span style="text-decoration: none">The acronym, CYA caught my attention…</span></p>
<p class="MsoNormal"><span style="text-decoration: none">Seems that CYA is recognised as ‘simple human nature’ and when it comes down to saving their e-mails, employee can use ‘CYA’  <span></span>argument against their employer.</span></p>
<p class="MsoNormal"><span style="text-decoration: none">Gosh, I guess one has to find new ways of dealing with e-discovery. So besides the charts and the step by step good practice guides, one can also use ‘CYA’ to save yourself and your e-mails. Would be interesting to see if there will be &#8216;CYA&#8217; related e-discovery cases.</span></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/09/18/e-book-on-e-discovery/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Alternative Search Technologies &#8211; Too Good to be True</title>
		<link>https://jollyvip.com/edisclosure/2008/05/09/alternative-search-technologies-too-good-to-be-true/</link>
		<comments>https://jollyvip.com/edisclosure/2008/05/09/alternative-search-technologies-too-good-to-be-true/#comments</comments>
		<pubDate>Fri, 09 May 2008 23:01:34 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2008]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Law Firms]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[ServiceProviders]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[search technologies]]></category>
		<category><![CDATA[TREC]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=128</guid>
		<description><![CDATA[It seems that alternative search technologies (alternative to the familiar Keyword and Boolean searches) touted by Vendors are considered as ‘too good to be true’. Check it out yourself at In Search of Better E-Discovery Methods By H. Christopher Boehning and Daniel J. Toal, New York Law Journal April 23, 2008 The above legal article [...]]]></description>
			<content:encoded><![CDATA[<p class="MsoNormal">It seems that alternative search technologies (alternative to the familiar Keyword and Boolean searches) touted by Vendors are considered as ‘too good to be true’. Check it out yourself at <a href="http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1208861019151">In Search of Better E-Discovery Methods</a> By H. Christopher Boehning and Daniel J. Toal, <a href="http://www.nylj.com/">New York Law Journal</a> April 23, 2008</p>
<p class="MsoNormal">The above legal article also mentioned the  <a href="http://trec-legal.umiacs.umd.edu/">Text Retrieval Conference</a> (TREC)<a href="http://jollyvip.com/edisclosure/files/2008/05/legaltrackoverview2006final1.pdf" title=" 2006 study"> 2006 study</a> which was also examined by Will Uppington in the article, <a href="http://www.clearwellsystems.com/e-discovery-blog/2008/03/11/better-search-for-e-discovery/" title="Permanent Link: Better Search for E-Discovery">Better Search for E-Discovery</a>, March 11th, 2008</p>
<p class="MsoNormal">What I find interesting in Will Uppington’s article is the finding; ‘One of the best ways to get better search queries is to commit human resources to improving them, by putting a “human-in-the-loop” while performing searches’.</p>
<p class="MsoNormal">Reading in between these two ‘search themed’ titles, one from the legal side and the other from a technical perspective, highlighted the contrasting findings and interpretation on the TREC 2006 study</p>
<p class="MsoNormal">What else can we say/talk about the ‘human-in-the loop’, the ‘virtuous cycle of iterative feedback’ &amp; &#8220;interactive&#8221; search methodology?</p>
<p class="MsoNormal">Well such phrases/concepts are not new. What is new is that the ‘human actions’ aspects are creeping (awareness?) into the ediscovery space. Other knowledge researchers outside the ediscovery domain have been busily coming up with phrases/concepts such as the ‘concept searching’ methodologies. Reality (or inertia adoption) testing of such newer technologies are clearly not well understood (too good to be true?) by the courts and practitioners.</p>
<p class="MsoNormal">On human actions and computer programs, a beautiful quote comes from my friend, Roger C: “While computer programs can write other computer programs, they can&#8217;t write the first program”.</p>
<p class="MsoNormal">To that I will add: An expert is only effective in the human-in-the-loop search if the expert is also an expert in the codes</p>
<p><span style="font-size: 10pt;font-family: 'Times New Roman'"></span></p>
<p class="MsoNormal"><span style="font-size: 12pt;font-family: Verdana"></span><span style="font-size: 12pt;font-family: Verdana"></span></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/05/09/alternative-search-technologies-too-good-to-be-true/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>E-mail Archiving – Myths according to a Solution Provider and Making Sense in Plain English of the FRCP</title>
		<link>https://jollyvip.com/edisclosure/2008/05/07/e-mail-archiving-myths-according-to-a-solution-provider-and-making-sense-in-plain-english-of-the-frcp/</link>
		<comments>https://jollyvip.com/edisclosure/2008/05/07/e-mail-archiving-myths-according-to-a-solution-provider-and-making-sense-in-plain-english-of-the-frcp/#comments</comments>
		<pubDate>Wed, 07 May 2008 16:23:00 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2008]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[ServiceProviders]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[e-mail archive]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=123</guid>
		<description><![CDATA[For those using Exchange, Outlook and Active Directory, you may be interested to read the white paper, Email Archiving: Common Myths and Misconceptions by MessageOne, Inc. If you&#8217;re curious on how a Solution Provider &#8216;makes sense in plain English of the FRCP, scan the posted white paper. I cannot comment on the MessageOne solution as [...]]]></description>
			<content:encoded><![CDATA[<p>For those using Exchange, Outlook and Active Directory, you may be interested to read the white paper, <a href="http://jollyvip.com/edisclosure/files/2008/05/commonmythsandmisconceptions1.pdf" title="Email Archiving: Common Myths and Misconceptions by MessageOne, Inc.">Email Archiving: Common Myths and Misconceptions by MessageOne, Inc.</a></p>
<p class="MsoNormal">If you&#8217;re curious on how a Solution Provider &#8216;makes sense in plain English of the FRCP, scan the posted white paper.</p>
<p class="MsoNormal">I cannot comment on the MessageOne solution as I have not used or been exposed to the product.</p>
<p class="MsoNormal">However in the white paper there is a statement ‘Data is never lost, and companies have robust search and retrieval functionality to meet the legal and compliance challenges facing all industries, today.’</p>
<p class="MsoNormal">‘Data is NEVER lost’? This is a myth with or without an archive system.</p>
<p class="MsoNormal">It’s so easy to forget that once e-mail is sent /delivered (a copy may reside on your sent folder/archive), the information/data is also OUT of reach of the sender. Another food for though &#8211; how to make sense of the clawback agreements for e-mails?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/05/07/e-mail-archiving-myths-according-to-a-solution-provider-and-making-sense-in-plain-english-of-the-frcp/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Compliance, Security or Operability questions for E-Discovery</title>
		<link>https://jollyvip.com/edisclosure/2008/04/28/the-compliance-security-or-operability-questions-for-e-discovery/</link>
		<comments>https://jollyvip.com/edisclosure/2008/04/28/the-compliance-security-or-operability-questions-for-e-discovery/#comments</comments>
		<pubDate>Mon, 28 Apr 2008 21:38:20 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Britain]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[People]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=113</guid>
		<description><![CDATA[&#160; Last week I went to the infosecurity Europe event in London as I was attracted by the keynotes titles and the interactive theatre. Besides returning home with three different caps/hats, one even has a battery attached to it (stress balls seems to be out of fashion for the security nerds and herd, which is [...]]]></description>
			<content:encoded><![CDATA[<p class="MsoNormal">&nbsp;</p>
<p class="MsoNormal">Last week I went to the <a href="http://www.infosec.co.uk/">infosecurity Europe</a> event in London as I was attracted by the keynotes titles and the interactive theatre. Besides returning home with three different caps/hats, one even has a battery attached to it (stress balls seems to be out of fashion for the security nerds and herd, which is good for me because I love hats), I also found that security is no longer confined to ‘security policies’ or even ‘communications policies’. Information security is an industry itself even though having a secured information system/network is still a myth.</p>
<p class="MsoNormal">On the panel discussion: ‘Which is more important – Compliance, Security or Operability?’, the question then is Compliance or Operability?.<span>  </span>‘Compliance’ is compliance with an array of rules/regulations/standards and no debates there and since ‘Operability’ (the intended meaning here is that the system is functional/operable/available) is also one interesting ‘ilities’ (others are ‘traceability and trackability’) for ediscovery; I was hoping to hear more debates on ‘operability’. No debates whatsoever on operability, instead couple of enlightening questions were raised around ‘information asset’. Ah! back to security in terms of protecting assets. Questions raised are ‘How to identify information assets including assets in the ‘cloud’? ‘How to put information asset at appropriate risks to achieve maximum value?’ <span> </span>These questions are also relevant for ediscovery. Worth pointing out that asset identification is one key activity of risks management. How many organisations perform risks management on a regular or even a sporadic basis? How many organisations have security policies or communications policies in place? In place or not, policies are considered ‘given’ if organisation is not to be burdened with ediscovery.</p>
<p class="MsoNormal"> Interestingly, the shift seems to be on the monitoring of systems/networks/e-mails etc (any conceivable ESI ) otherwise also referred to as ‘vulnerability management’ (replacing risk management?).</p>
<p class="MsoNormal">Monitoring of electronic communications was recently reported in the article, ‘<a href="http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1208515553258">E-Discovery Keeps an Eye on the Job’</a> by A. Michael Weber <a href="http://www.nylj.com/">New York Law Journal</a> April 25, 2008. Here, the assets (also potential sources of ESI) are not just e-mails but also physical assets. Now imagine working in an organisation whereby such assets are ‘classified as company secrets’?! Mmm I wonder what Bruce Schneier will write after ‘Beyond Fear’. I have not read the book, just what’s on <a href="http://www.schneier.com/book-beyondfear.html">http://www.schneier.com/book-beyondfear.html</a>. <span> </span>How about ‘Beyond Reason’? </p>
<p class="MsoNormal">Before I get too carried away, back to the infosecurity show…</p>
<p class="MsoNormal">A striking reminder comes from the chair of ‘The Hacker’s Panel’ (which I also attended out of curiosity as I was attracted by the lack of disclosure on the topic which said ‘ for legal reasons the panellists will not be revealed) was the old adage, ‘you can’t control what you can’t measure’. The theatre (non interactive, capacity 100-200) was pretty full. I remembered having to queue to enter.</p>
<p class="MsoNormal">So the reminder further re-inforced that information security is a myth. Can’t measure, can’t control. Can’t measure because no (reliable/operable?) information is available on cybercrime. Some mumbling on human factors, change behaviour, ‘hacker’ mindset gaps all revealing that security is not just related to policies, codes, printers, e-mails or networks.</p>
<p class="MsoNormal">Also a good reminder for ediscovery/disclosure <img src='https://jollyvip.com/edisclosure/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /></p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/04/28/the-compliance-security-or-operability-questions-for-e-discovery/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Just for the record &#8211; 2nd article on the IBA Rules</title>
		<link>https://jollyvip.com/edisclosure/2008/04/23/just-for-the-record-2nd-article-on-the-iba-rules/</link>
		<comments>https://jollyvip.com/edisclosure/2008/04/23/just-for-the-record-2nd-article-on-the-iba-rules/#comments</comments>
		<pubDate>Wed, 23 Apr 2008 23:34:21 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2008]]></category>
		<category><![CDATA[Arbitral Practice]]></category>
		<category><![CDATA[Arbitration]]></category>
		<category><![CDATA[CPR]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Rules]]></category>
		<category><![CDATA[Rules/Directions]]></category>
		<category><![CDATA[ESI]]></category>
		<category><![CDATA[IBA]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=112</guid>
		<description><![CDATA[The other article (which was referenced in my dissertation) was posted here under the title: WHERE NEITHER THE IBA RULES NOR U.S. LITIGATION PRINCIPLES ARE ENOUGH Just recently my friend, Martin (another ex-student of QM) pointed out another article in the International Journal of Arbitration, Mediation and Dispute Management, Vol 74, Number 1, February 2008 [...]]]></description>
			<content:encoded><![CDATA[<p>The other article (which was referenced in my dissertation) was posted here under the title:<a href="http://iedisc.com//?p=51" title="Permalink to WHERE NEITHER THE IBA RULES NOR U.S. LITIGATION PRINCIPLES ARE ENOUGH" rel="bookmark"> WHERE NEITHER THE IBA RULES NOR U.S. LITIGATION PRINCIPLES ARE ENOUGH</a></p>
<p>Just recently my friend, Martin (another ex-student of QM) pointed out another article in the International Journal of Arbitration, Mediation and Dispute Management, Vol 74, Number 1, February 2008 issue, the title; &#8216;Confronting the Matrix:Do the IBA Rules Require Amendment to Deal with the Challenges Posed by Electronically Stored Information? by Nicholas Tse and Natasha Peter.</p>
<p>As expected, the answer is a simple &#8216;yes, the IBA Rules require amendment&#8217; (like the 1st article). The solutions though are not so simple. For me, the solutions are not within the IBA Rules. That&#8217;s another story.</p>
<p>Although the second article provided guidance from the English and US amendments and strategies for dealing with problems posed by ESI, the challenges posed by ESI for arbitrators and parties are still in the making or rather unconfronted.</p>
<p>Can one confront the Matrix and maintain a &#8216;flexible&#8217; IBA Rules?</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/04/23/just-for-the-record-2nd-article-on-the-iba-rules/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Recent March publication &amp; activity from the Sedona Conference</title>
		<link>https://jollyvip.com/edisclosure/2008/04/06/recent-march-publication-activity-from-the-sedona-conference/</link>
		<comments>https://jollyvip.com/edisclosure/2008/04/06/recent-march-publication-activity-from-the-sedona-conference/#comments</comments>
		<pubDate>Sun, 06 Apr 2008 22:24:52 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2008]]></category>
		<category><![CDATA[Community]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[FRCP]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[evidence]]></category>
		<category><![CDATA[sedona]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=105</guid>
		<description><![CDATA[I have just found the WG1 March 2008 publication at the Sedona Conference site. The title is Commentary on ESI Evidence &#38; Admissibility. Have not read it yet. Maybe there will also be a publication from the Spring Conference (March event): THE SECOND ANNUAL PROGRAM ON GETTING AHEAD OF THE eDISCOVERY CURVE: STRATEGIES TO REDUCE [...]]]></description>
			<content:encoded><![CDATA[<p>I have just found the WG1 March 2008 publication at the Sedona Conference site. The title is <a href="http://www.thesedonaconference.org/content/miscFiles/publications_html?grp=wgs110" title="ESI Evidence">Commentary on ESI Evidence &amp; Admissibility.</a> Have not read it yet.</p>
<p>Maybe there will also be a publication from the Spring Conference (March event):<br />
THE SECOND ANNUAL PROGRAM ON GETTING AHEAD<br />
OF THE eDISCOVERY CURVE: STRATEGIES TO REDUCE<br />
COSTS &amp; MEET JUDICIAL EXPECTATIONS</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2008/04/06/recent-march-publication-activity-from-the-sedona-conference/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
