BIA
97 FOLLOWERS
Join eDiscovery, forensics, and law professionals who read the BIA blog for the latest in ediscovery and digital forensics topics and access free resources.
BIA
1y ago
Facebook Twitter LinkedIn Email Print
Mentioned for its product HaystackID Core
WASHINGTON – October 12, 2022 – HaystackID, a specialized eDiscovery services firm supporting law firms and corporate legal departments, is pleased to announce that the Gartner Market Guide for E-Discovery Solutions has named the firm as a Representative E-Discovery Service Provider for the second straight year.
The report by research and advisory company Gartner, Inc. is authored by industry analyst Michael Hoeck and states that “I&O leaders must partner with legal and compliance teams to develop strategi ..read more
BIA
1y ago
Facebook Twitter LinkedIn Email Print
WASHINGTON and NEW YORK – September 7, 2022 – HaystackID, a specialized eDiscovery services firm supporting law firms and corporate legal departments, today announced it has acquired Business Intelligence Associates (BIA), an end-to-end eDiscovery service provider, as part of a deal facilitated by majority investor and leading middle-market private equity firm, Quad-C Management, Inc.
“BIA is a leader in eDiscovery, and this combination further expands our capabilities in the support and delivery of complex enterprise discovery solutions, especially ..read more
BIA
1y ago
Facebook Twitter LinkedIn Email Print
What does the Grieving Families Act mean for eDiscovery?
The Grieving Families Act: Bill S74A has been passed by New York State Senate and is currently under review by Governor Kathy Hochul. The proposed Bill contains significant amendments to New York’s Wrongful Death Law—a law which has not changed since the mid-nineteenth century. If the Grieving Families Act is signed into law, eDiscovery—particularly social media investigations—will play an even more significant role in wrongful death suits as well as New York Labor Law cases.
What is the Grieving Fam ..read more
BIA
1y ago
Facebook Twitter LinkedIn Email Print
Make the last step a breeze with our Litigation Hold Release Notice Template. What is a Litigation Hold Release Notice?
A Litigation Hold Release Notice (or Legal Hold Release Notice) is a document sent to individuals on litigation hold when their responsibility to maintain evidence in the form of documents, ESI, and other data is no longer required to support the issuing organization’s legal preservation obligations.
Why do I need a Litigation Hold Release Notice?
Holding data for longer than needed can lead to unnecessary costs and avoidable risks down t ..read more
BIA
1y ago
Facebook Twitter LinkedIn Email Print
Is your organization ready to combat Business Email Compromise (BEC) attacks?
Business Email Compromise (BEC) attacks are a type of phishing attack where cybercriminals send emails to targeted personnel posing as fellow employees, managers, retirees, or contractors, in an attempt to establish a trusted relationship or take advantage of one that already exists. Once hackers make a connection, they exploit that trust to extract sensitive financial information, re-route vendor payments, send payroll direct deposits to an account they control, and other such n ..read more
BIA
2y ago
Facebook Twitter LinkedIn Email Print
Do you really need that full forensic image, or will a targeted data collection get the job done?
Full forensic imaging and targeted data collections may sound similar and even get tossed around interchangeably at times, but they are very different operations. We see countless hours of time and millions of dollars wasted due to clients choosing full forensic imaging when a targeted data collection is what they really need. Understanding some important differences between the two data collection types will help you make the right choice for your case and yo ..read more
BIA
2y ago
Facebook Twitter LinkedIn Email Print
How do ransomware attackers enlist insiders to deliver malware for them?
Ransomware attackers are now enlisting insiders to deliver their malware. Perhaps it’s because some cybercriminals lack the technical skills necessary to gain access to internal systems and deliver their ransomware themselves, or maybe they just find recruiting insiders to be an easier way to do it. Whatever their motivation, bad actors are now sending emails to organizations’ employees and promising them substantial payoffs if these insiders will deploy their ransomware for them.
Wit ..read more
BIA
2y ago
Facebook Twitter LinkedIn Email Print
Here’s why you should leverage eDiscovery for corporate internal investigations.
Too many organizations treat corporate internal investigations and eDiscovery efforts as two separate domains, but the simple truth is that internal investigations and eDiscovery processes are not all that different.
Both processes involve the identification, preservation, collection, review and analysis of data, with the primary difference being the overall scope. In general, corporate internal investigations tend to be more focused, while eDiscovery efforts cover a broader r ..read more
BIA
2y ago
Facebook Twitter LinkedIn Email Print
Here’s why the litigation hold reminder is just as important as the original hold notice. What is a litigation hold reminder?
Litigation hold reminders are messages routinely sent to custodians on litigation hold to remind them of their continuing obligation to preserve data relevant to the matter.
Why do I need a litigation hold reminder?
It’s not unusual for years to go by between the start and the final disposition of a matter. Given that, Courts have set the expectation that parties will routinely remind custodians of their continuing preservation obli ..read more
BIA
2y ago
Facebook Twitter LinkedIn Email Print
How to Recognize and Avoid Phishing Attacks
Phishing attacks come in many variants. Even if your organization has implemented state-of-the-art email filters, no technical control will stop 100% of phishing emails from reaching their intended recipients. Your best defense against these attacks is to arm yourself with information that prevents you from becoming a victim.
Failure to recognize and avoid phishing attacks can result in significant and even catastrophic consequences. Phishing is often a precursor to ransomware and/or extortion attacks that depriv ..read more