1.866 LUCIDATA (582.4328) | info@lucidatainc.com
Leave nothing uncovered. Leave nothing to chance.

TRAINING/CLE’s

These CLE’s are designed for legal and technical professionals of all levels including in-house counsel, records managers, IT staff, law firm attorneys, litigation support professionals, paralegals and government officials. Any individual with responsibility for identifying, preserving, collecting, reviewing and producing ESI in an investigation, litigation or regulatory matter should attend this course.

Cost: Free. These CLE’s can be presentation at your firm or company or via webinar.

Changing the Game: What You Need to Know About Computer Forensics

Computer forensics can be used in a wide array of situations that don’t necessarily require a computer to be the focal point of a crime. This presentation will give a basic overview of how files are deleted and recovered and what types of data can be recovered from various electronic devices.

Learn:

  • The basics of computer forensics and what it entails
  • Basic preservation of electronic evidence and spoliation issues.
  • What can be recovered from a computer, laptop, PDA cell phone, etc.
  • Top 10 Mistakes not to make in an investigation.

eDiscovery 101 – Everything You Want to Know* But Were Afraid to Ask

Increasingly, more organizations are being confronted with litigation whether it is fraud, theft of intellectual property or class action lawsuits to name a few. Such litigation is prompting many companies to rethink their overall information management strategies, from the policy level to the implementation level and how to identify, capture and process data for litigation in the shortest amount of time for the least amount of money. Let’s face it – there is a lot of information available about eDiscovery, how save money at it, make it easy and how it will win your case. There is also a lot of conflicting terminology and advice too.

This presentation will provide a clear and concise high level overview of the definitions, descriptions, and drivers as well as the tools and tactics of “electronic discovery. Explore how search methods using current technology, and how using better search tools can combat the growing costs of litigation and efficiently reduce the volume of information while and increasing the quality of information being reviewed. See how content and conceptual analysis technology has dramatically changed how electronic and paper-based data are being addressed in order to improve how legal professionals research their case information. Topics covered are:

  • What is eDiscovery?
  • Overview of definitions, terms and terminology
  • Content vs Conceptual analysis – what is this?
  • Growth of Early Case Assessment tools
  • Masses amounts of data – no problem – we have tools for that!
  • Online review – the good, the bad and the ugly

Strategies for Controlling eDiscovery Costs

Learn how to leverage the latest technologies to create a smarter workflow approach, extend the value of existing in-house review tools, and efficiently reduce the volume of information while and increasing the quality of information being reviewed.  See how next generation tools are dramatically changing how electronic and paper-based data are being addressed in order to improve how legal professionals research their case information.

Learn:

  • Learn how to immediately reduce the total volume of discovered data.
  • Quickly isolate key pieces of information scattered throughout a data set.
  • Combine this approach effectively with popular tools like CT Summation and Concordance.
  • Decrease overall review costs and increase review speeds and quality.

How Technology Has Drastically Changed the Search Landscape

Explore new search methods using current technology, and how using better search tools can combat the growing costs of litigation and efficiently reduce the volume of information while and increasing the quality of information being reviewed.   See how content and conceptual analysis technology has dramatically changed how electronic and paper-based data are being addressed in order to improve how legal professionals research their case information.

Learn:

  • Learn how to immediately reduce the total volume of discovered data.
  • Quickly isolate key pieces of information scattered throughout a data set.
  • Decrease overall review costs and increase review speeds and quality.
  • Discuss the future of search

Protecting Company IP from Employee Transition

Employee, intellectual and property theft are nothing new; expect their increase, as current economic conditions demand voluntary and involuntary terminations and employee transitions.  Be proactive; identify measures to manage rising risks.  Take protective measures before and after transitions.  Don’t think IP theft can’t or won’t happen at your company, odds are, it already has and will continue.

Learn:

  • How employees exploit Intellectual Property
  • Learn why policy and procedures alone don’t protect IP
  • Technologies to protect IP

Data Breach Identification and Analysis

You had a breach or maybe you didn’t, how do you know?  Where do you look to prove or disprove a breach?  Do you know where your critical data is located if computers get compromised or lost?  How do you preserve data for proper breach investigation without compromising critical evidence?  Learn these and other issues facing companies by stepping through some common data breach scenarios.

Learn:

  • Do’s and Don’ts following data breach
  • Breach analysis steps
  • Proactively prevent data breaches

Computer Forensic Case Studies from Fact to Fiction (or is it)?

As technology changes, so does the need for computer forensics.  People try to get away with almost anything.  What is even better is that they SAY everything electronically.  Over the years, the bizarre has become the norm.  Is it fiction?  I don’t think so, but you might think that you are hearing a movie script.  From faking a stroke to a corporate group sex brunch/lunch to stalking your spouse, I guess stealing intellectual property is just too boring.

Learn:

  • The crazy things people say on IM and email
  • How do people try to cover their trail
  • What can and can’t be found on a computer
  • Ways to stop this from happening to you

 

Internal Threat: The Real Risk

What if you woke up tomorrow to see headlines in the New York Times or Wall Street Journal announcing the theft of your customer’s personal data or valuable intellectual property? The regulators are at your door, privacy activists are demanding a response, shareholders are screaming, the lawyers are ready to pounce and the news networks can’t wait to speak to you. The clock is ticking. Now what?

Skyrocketing computer-related crime coupled with the explosion in electronic documentation presents litigators, corporate counsel and IT professionals with unprecedented challenges. Protecting confidential customer data and intellectual property is quickly becoming a top priority for any company that needs to protect their brand and reputation. In addition, compliance regulations such as Sarbanes-Oxley, HIPAA and the Gramm-Leach-Bliley Act and the new E-Discovery rules make it a necessity to protect and guarantee the integrity of company and customer information.

More than ever, organizations are finding themselves entangled in costly litigation caused by inappropriate use of computers. To help companies avoid costly litigation and prepare the strongest cases possible, you must be able protect, extract and analyze information from a wide variety of data storehouses in the proper manner.

Learn:

  • What are the possible litigation threats
  • How do you use data forensics/content monitoring tools to identify internal threats
  • First steps you should take to respond to an incident and mitigate further damage
  • How to build internal policies and procedures to prepare for future potential incidents
  • How to measurably reduce your risk of future incidents