With the new year in full swing, there's a lot of conversation around what comes next and what 2020's impact will mean for 2021. IT teams, specifically, are working to understand how to get a grip on content sprawl in the era of remote work. A recent study commissioned by Egnyte surveyed 400 IT leaders to understand how COVID-19 has impacted businesses’ ability to maintain data security and governance with a distributed workforce.
There have been some interesting developments in the world of E-Discovery tied to many of the same privacy protection laws and regulations changing the game in records and information management. To get a better understanding of how these regulations are affecting cross-border Discovery, we connected with our friends at the Association of Certified E-Discovery Specialists (ACEDS). Please enjoy this guest post by Mike Quartararo, President of ACEDS. Parties in the US are allowed broad and liberal discovery of electronically stored information (ESI) relevant and proportional to the claims and defenses in a legal action. When a US-based litigant seeks ESI stored in other countries, however, it raises thorny legal and practical issues. ACEDS recently conducted a webinar on this topic entitled “Now What? Cross-Border and International Discovery Post-Schrems II” with Bryant Isbell from Baker & McKenzie and Eric Mandel from Driven.
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.
As the COVID-19 pandemic continues to accelerate, there are some innovative efforts to minimize its impact. In one such approach, a multidisciplinary group of computer scientists, mathematicians, and epidemiologists at the Big Data Institute at Oxford University have developed a mathematical model instantiated in a mobile application that traces contact. Those involved in the project believe it's "..possible to stop the epidemic…if contact tracing is sufficiently fast, sufficiently efficient, and happens at scale." Typically, contact tracing is the most effective way to contain an outbreak. However, with a virus like COVID-19, that's preponderantly transmitted by asymptomatic patients, "classical contact tracing will not be enough to achieve the speed and efficiency needed, but it could be achieved by a contact tracing mobile app if used by a sufficiently large proportion of the population."
As we enter into a new decade, it's hard not to look back and reflect on how different everything is now. Twenty years ago, the world was a completely different place than it is today.
According to the 2019 IDC study of spending on Artificial Intelligence (AI), it's estimated to reach $35.8 billion in 2019 and is expected to double by 2022 to $ 79.2 billion representing an annual growth rate of 38% for the period 2018-2022. The economic benefits and utility of AI technologies are clear and compelling. No doubt, applications of AI may address some of the most vexing social challenges such as health, the environment, economic empowerment, education, and infrastructure. At the same time, as AI technologies become more pervasive, they may be misused and, in the absence of increased transparency and proactive disclosures, create ethical and legal gaps. Increased regulation may be the only way to address such gaps.
One of the most vexing problems for organizations is mitigating GDPR compliance risks when dealing with third parties, particularly the nature and extent of obligations between data controllers and processors. By virtue of the GDPR accountability principle, organizations are required to adhere to the six fundamental principles of safeguarding privacy rights that impact the collection, processing and disposition of personally identifiable information. These obligations extend beyond the walls of an organization to third parties that process personally identifiable information. Also, GDPR provides for a broad definition of processing and imposes stringent requirements on organizations that engage third parties to process personally identifiable information.