Category: Articles, Business & Commerce, Communications, Computer/Internet, e-Discovery, Resources for Attorneys, Resources for Experts, Safety, Security The Danger of Generative AI for Online Fraud TASA ID: 22108 Have you ever wondered how the rapid advancements in artificial intelligence could turn against us, particularly in the realm of online fraud? My recent conversation with Alex Zeltcer, CEO of nSure.ai, sheds light on this alarming issue. Read more
Category: Articles, Communications, Computer/Internet, e-Discovery, Employment, Financial/Economic, Human Resources, Resources for Attorneys, Resources for Experts Hybrid Work Could Save Knowledge Workers’ Jobs From AI TASA ID: 22108 As the world slowly recovers from the pandemic, many knowledge workers find themselves at a crossroads. On one hand, the prospect of returning to the office stirs up a cocktail of dread and nostalgia. On the other hand, the threat of AI-driven job elimination looms large. It's like being caught between a rock and a hard place, or more aptly, between a swivel chair and a supercomputer. But let's take a step back and examine the situation. The office, despite its occasional inconveniences, offers a unique environment for collaboration, innovation, and social interaction. It's the proverbial watering hole where ideas are exchanged, relationships are forged, and corporate culture is nurtured. That’s how I encourage my clients to frame the conversation in formulating their approach to hybrid work policy. Read more
Category: Articles, Business & Commerce, Computer/Internet, e-Discovery, Financial/Economic, Resources for Attorneys, Resources for Experts, Safety, Security Blockchain: Beware of the crypto-hype December 2018 TASA ID: This article was originally published in ITNOW, Volume 60, Issue 4, Pages 22–23, 1 December 2018, by © 2018 The British Computer Society.Dr. Stephen Castell explains why IT professionals need to watch out for crypto-hype and be alert to the problems ahead.There is currently a crypto-algorithmic blockchain technology mania. Huge amounts of money, commentary, thought, ink and new paper column inches are being lavished on blockchain based technologies such as cryptocurrencies, smart contracts and distributed ledgers.It seems almost every millennial is involved with an initial coin offering (ICO) or initial token offering (ITO). A few of these may prove to be commercially successful. They may establish a new crypto-economic paradigm. I wish these crypto-enthusiast millennials well. Indeed, I have dubbed crypto the millennials’ rock’n’roll.To read the complete article, click here. Read more
Category: Articles, Computer/Internet, e-Discovery, Resources for Attorneys, Resources for Experts The Flaws of Using Search Methods in E-discovery Whitepaper TASA ID: 1793 Introduction The document review industry has used search methods for various purposes. The use of search methods have been validated by using flawed validation methods. I could show the validation methods that have been used are flawed due to the interference of networked-based distributed review models on performance, reviewer qualification mismatches, using tag counts in validation methods, and the misuse of statistical methods. Statistical methods, which always involve using small probability theory to address low-frequency high-risk problems, are sufficient to make most search results invalid. The flaw in using statistical methods in litigation is similar to using the small probability theory to address risks in the aviation industry which would lead to hull losses. I conduct a brief analysis of two well known key search methods which have been used widely to generate document pools for human review. Read more
Category: Articles, e-Discovery, Intellectual Property, Legal Technology, Resources for Attorneys Causes of Inadvertent Disclosure of Privileged Documents and Strategies for Protecting Privileged Documents Whitepaper TASA ID: 1793 There is an inherent difficulty in keeping privileged documents and especially work product in e-discovery. This problem can cause the most serious damages to litigants, and consequences including anything from direct loss of cases to protracted procedural complications are reflected in a large number of cases. Each time when a privileged document is leaked, there is no real remedy. Clawing-back documents gives the producing party only a right to stop the receiving party from using the leaked documents directly. However, nothing can stop the receiving party from collecting information from other sources to strengthen its case by using the leaked documents as road maps. One should expect that the receiving party will keep copies of leaked documents for reference and may use them to cross-check anything affecting its case. Therefore, this problem must be addressed seriously. I will discuss what the main cause for the frequent leaking of privileged documents. Read more