Schedule a Demo

BLOG

See the latest news and insights around Information Governance, eDiscovery, Enterprise Collaboration, and Social Media. 

What Is Social Media Impersonation (Identity Theft)? And How Can You Prevent It?

With the rise of social media, individuals have become increasingly comfortable sharing personal information online. However, this has also made them susceptible to social media impersonation, a growing phenomenon that can lead to identity theft and other online fraud. Impersonators can easily create fake profiles and use stolen personal information to deceive others. They may use this information to gain access to private accounts or even steal money.

The Major Microsoft Teams Challenge Stumping Legal & Compliance Teams

Since 2019, the number of users on Microsoft Teams has risen 1500%, from a modest 20 million users in the pre-pandemic year (2019) to over 320 million users in 2024. Microsoft's collaboration platform is now the default messaging app for over one million organisations.

Pagefreezer Adds Microsoft Teams Archiving to Suite of Recordkeeping Solutions

Pagefreezer now offers Microsoft Teams archiving as part of its legal and compliance solutions.

Pagefreezer and ACEDS Releases E-Discovery Report on Dynamic, Cloud-Based ESI

The popularity of online channels—such as company websites, social media accounts, collaboration platforms, and messaging apps—grew steadily throughout the 2010s. But with the arrival of the COVID pandemic at the start of 2020, these online data sources became crucial to the day-to-day operation of countless organizations.

10 Forms of Social Media Bullying and Harassment to Watch Out For

As social media usage has increased, so have the different types of abuse, harassment, bullying, and defamation victims can face online. One of the most powerful tools to combat this growing trend is education, making it easier to handle situations that can suddenly materialize. This blog discusses the ten forms of social media bullying and harassment by offering concrete examples and insights into its many forms.

10 Ways to Protect Yourself from Social Media Abuse and Harassment

Since the beginning of social media, people from all over have been able to share their thoughts and ideas. The dark side of this revolutionary change is that not everyone has something kind to say, which makes protecting yourself against social media harassment critical.

What is a Document Retention Policy And Why Do You Need One?

Any business that deals with sensitive information needs a document retention policy. Does your business have staff you keep records on, for example? If so, your business deals with sensitive information.

When Fake Electronic Evidence Is Used in Court

With the digital realm increasingly shaping both our personal and professional lives, the rise of electronic evidence in legal cases was inevitable. But as technology advances, so do the methods for creating fake digital evidence, posing significant challenges for courts.

Meet and Confer: Understanding FRCP Rule 26(f)

An efficient and cooperative discovery stage can have a huge impact on the smooth progression of a legal case. As the examination of increasingly vast quantities of electronic documents becomes commonplace, an effective and dependable approach to this important element of modern litigation is essential.

6 Steps to Implementing a Legal Hold

Companies must ensure they are in total compliance with data preservation requirements—and with the growing amounts of ESI generated, it is increasingly common for litigation to require access to evidence stored digitally. So what can legal teams do to ensure that crucial data is placed on legal hold and not disposed of?

    Related Posts