See the latest news and insights around Information Governance, eDiscovery, Enterprise Collaboration, and Social Media.
Traditional discovery is the initial phase of litigation when all parties are required to provide records and evidence relevant to a specific case. However, thanks to the explosion of electronically stored information (ESI), discovery must now work alongside eDiscovery—a process that involves the identification, preservation, collection, retention, and review of data in an electronic format. This makes the discovery exponentially larger and more complex.
Traditional discovery is the initial phase of litigation when all parties are required to provide records and evidence relevant to a specific case. However, thanks to the explosion of electronically stored information (ESI), discovery must now work alongs
Ransomware attacks are on the rise, but sophisticated dark web forensics and tools are helping investigators to transform the dark web from a murky and lawless online environment, into a treasure trove of evidence and information. In the 1900s, organised
Businesses generate documentation and data at a rapid pace, both on and offline. Industries like banking and the financial sector regularly manage thousands of different types of documents. Keeping up with this cumulative documentation can be difficult an
Chain of custody, in a legal context, can refer to both physical and electronic evidence. With the huge increase in the leverage of the latter within litigation cases, today, chain of custody is a key requirement of any eDiscovery process.
Unlike some other eDiscovery processes, a legal hold reaches far beyond your legal department and can potentially impact personnel across your whole business.
Optical character recognition (OCR) offers organizations the opportunity to get a much better digital handle on the information they store.
Ways to Protect Yourself Online from "Crooked Sweethearts" Catphishing (or “Catfishing”) is a “romance scam” and form of fraud, highly popularised by the use of social media networks, online chat forums and documentary-turned television series by the same
Not long ago, deepfake videos – videos that portray something in a very convincing way but are actually entirely false - were something that largely existed in Hollywood – the product of special effects studios and experts trained to make the fictional se
On January 7th, 2025, Meta announced they will be making major changes to content moderation policies on all their owned platforms, including Facebook: ending third-party fact-checking in the US in lieu of a new "Community Notes" feature, lifting restrict
Those who practice law understand and appreciate the power of precedent. As technology evolves, and as our digital world continually expands, the law is evolving with it. Courts across the country are continuing to examine social media as evidence the sta
SHA-256 is one of the most widely used cryptographic hashing algorithms, playing a crucial role in securing digital information. Part of the Secure Hash Algorithm 2 (SHA-2) family, SHA-256 ensures data integrity, safeguards sensitive information, and authenticates digital evidence and records in legal and compliance scenarios.
These days, you'd be hard-pressed to find an business that isn't advertising on social media. But when it comes to financial service providers, social media marketing can become a double-edged sword, or worse a compliance nightmare that results in major fines from the SEC, FINRA or the FTC.
Head Office:
#500-311 Water Street
Vancouver, BC V6B 1B8
Canada
Europe Office:
Van Leeuwenhoekpark 1
2611 DW, Delft
The Netherlands
UK Office:
+44 20 3744 7173
Australia Office:
+61 (07) 3186 2199
© 2025 Pagefreezer Software Inc. All Rights Reserved. Privacy Policy and Acceptable Use Policy. Commercial use and distribution of the contents of this website is not allowed without express and prior written consent of Pagefreezer Software Inc. subject to existing copyright exceptions and limitations.