HaystackID® Named a Representative E-Discovery Service Provider in the 2022 Gartner® Market Guide for E-Discovery Solutions
BIA
by BIA
1y ago
Facebook Twitter LinkedIn Email Print Mentioned for its product HaystackID Core WASHINGTON – October 12, 2022 – HaystackID, a specialized eDiscovery services firm supporting law firms and corporate legal departments, is pleased to announce that the Gartner Market Guide for E-Discovery Solutions has named the firm as a Representative E-Discovery Service Provider for the second straight year. The report by research and advisory company Gartner, Inc. is authored by industry analyst Michael Hoeck and states that “I&O leaders must partner with legal and compliance teams to develop strategi ..read more
Visit website
HaystackID® Acquires Business Intelligence Associates, Marking Its Fifth Investment in Four Years
BIA
by BIA
1y ago
Facebook Twitter LinkedIn Email Print WASHINGTON and NEW YORK – September 7, 2022 – HaystackID, a specialized eDiscovery services firm supporting law firms and corporate legal departments, today announced it has acquired Business Intelligence Associates (BIA), an end-to-end eDiscovery service provider, as part of a deal facilitated by majority investor and leading middle-market private equity firm, Quad-C Management, Inc.  “BIA is a leader in eDiscovery, and this combination further expands our capabilities in the support and delivery of complex enterprise discovery solutions, especially ..read more
Visit website
The Grieving Families Act and eDiscovery
BIA
by Ron Tienzo
1y ago
Facebook Twitter LinkedIn Email Print What does the Grieving Families Act mean for eDiscovery? The Grieving Families Act: Bill S74A has been passed by New York State Senate and is currently under review by Governor Kathy Hochul. The proposed Bill contains significant amendments to New York’s Wrongful Death Law—a law which has not changed since the mid-nineteenth century. If the Grieving Families Act is signed into law, eDiscovery—particularly social media investigations—will play an even more significant role in wrongful death suits as well as New York Labor Law cases. What is the Grieving Fam ..read more
Visit website
Litigation Hold Release Notice Template
BIA
by BIA
1y ago
Facebook Twitter LinkedIn Email Print Make the last step a breeze with our Litigation Hold Release Notice Template. What is a Litigation Hold Release Notice? A Litigation Hold Release Notice (or Legal Hold Release Notice) is a document sent to individuals on litigation hold when their responsibility to maintain evidence in the form of documents, ESI, and other data is no longer required to support the issuing organization’s legal preservation obligations. Why do I need a Litigation Hold Release Notice? Holding data for longer than needed can lead to unnecessary costs and avoidable risks down t ..read more
Visit website
Business Email Compromise (BEC) Attacks: What You Should Know
BIA
by BIA
1y ago
Facebook Twitter LinkedIn Email Print Is your organization ready to combat Business Email Compromise (BEC) attacks? Business Email Compromise (BEC) attacks are a type of phishing attack where cybercriminals send emails to targeted personnel posing as fellow employees, managers, retirees, or contractors, in an attempt to establish a trusted relationship or take advantage of one that already exists. Once hackers make a connection, they exploit that trust to extract sensitive financial information, re-route vendor payments, send payroll direct deposits to an account they control, and other such n ..read more
Visit website
Full Forensic Imaging vs. Targeted Data Collections: Which One Do I Need?
BIA
by Wes Johnson
2y ago
Facebook Twitter LinkedIn Email Print Do you really need that full forensic image, or will a targeted data collection get the job done? Full forensic imaging and targeted data collections may sound similar and even get tossed around interchangeably at times, but they are very different operations. We see countless hours of time and millions of dollars wasted due to clients choosing full forensic imaging when a targeted data collection is what they really need. Understanding some important differences between the two data collection types will help you make the right choice for your case and yo ..read more
Visit website
Ransomware Attackers Enlisting Insiders to Deliver Malware
BIA
by BIA
2y ago
Facebook Twitter LinkedIn Email Print How do ransomware attackers enlist insiders to deliver malware for them? Ransomware attackers are now enlisting insiders to deliver their malware. Perhaps it’s because some cybercriminals lack the technical skills necessary to gain access to internal systems and deliver their ransomware themselves, or maybe they just find recruiting insiders to be an easier way to do it. Whatever their motivation, bad actors are now sending emails to organizations’ employees and promising them substantial payoffs if these insiders will deploy their ransomware for them. Wit ..read more
Visit website
EDiscovery’s Role in Corporate Internal Investigations
BIA
by Brian Schrader, Esq.
2y ago
Facebook Twitter LinkedIn Email Print Here’s why you should leverage eDiscovery for corporate internal investigations. Too many organizations treat corporate internal investigations and eDiscovery efforts as two separate domains, but the simple truth is that internal investigations and eDiscovery processes are not all that different. Both processes involve the identification, preservation, collection, review and analysis of data, with the primary difference being the overall scope. In general, corporate internal investigations tend to be more focused, while eDiscovery efforts cover a broader r ..read more
Visit website
Litigation Hold Reminder Template
BIA
by BIA
2y ago
Facebook Twitter LinkedIn Email Print Here’s why the litigation hold reminder is just as important as the original hold notice. What is a litigation hold reminder? Litigation hold reminders are messages routinely sent to custodians on litigation hold to remind them of their continuing obligation to preserve data relevant to the matter. Why do I need a litigation hold reminder? It’s not unusual for years to go by between the start and the final disposition of a matter. Given that, Courts have set the expectation that parties will routinely remind custodians of their continuing preservation obli ..read more
Visit website
Phishing Attacks: How to Avoid Becoming a Victim
BIA
by BIA
2y ago
Facebook Twitter LinkedIn Email Print How to Recognize and Avoid Phishing Attacks Phishing attacks come in many variants. Even if your organization has implemented state-of-the-art email filters, no technical control will stop 100% of phishing emails from reaching their intended recipients. Your best defense against these attacks is to arm yourself with information that prevents you from becoming a victim. Failure to recognize and avoid phishing attacks can result in significant and even catastrophic consequences. Phishing is often a precursor to ransomware and/or extortion attacks that depriv ..read more
Visit website

Follow BIA on FeedSpot

Continue with Google
Continue with Apple
OR