Share On

Loading...
PROCESSING. PLEASE WAIT...

"An Introduction to Obstacles in Cross-border Discovery"

Cross-Border Discovery: An Introduction to Cultural and Legal Obstacles

Cross-Border Discovery: An Introduction to Cultural and Legal Obstacles

White Paper: Special Counsels eQ

Today, an employee from a London company can wirelessly send emails to customers in New York from a Parisian café using cloud servers located in Dallas, Amsterdam and Berlin.

The low cost of electronic storage coupled with the high speed of global communication networks makes it increasingly unlikely that a corporation’s data is stored within the geographic borders of the United States. Electronically stored information (ESI) stored outside the U.S. presents a number of obstacles, in addition to the “normal” challenges regarding the collection, processing and production of eDiscovery. International treaties and agreements concerning cross-border discovery made before social networking platforms, cloud computing and ultra-fast global network connections are outdated, and with little hope of sweeping reforms any-time soon, it leaves much up in the air.

This Whitepaper describes the cultural and legal obstacles faced by companies while going global.

Login With

Related White Papers

Mastering the challenge of Digital Transformation

By: Software AG

Digital business transformation is based on an IT architecture transformation with a roadmap for digital capability implementation. Based on the software platforms, digital companies create enhanced or totally new business models which offer completely new digital customer experiences. Established companies are building up software know-how and are acquiring software companies to accelerate their digital transformation by injecting software innovation capabilities into their core business areas. This whitepaper helps to understand what makes today’s digital challengers attractive to customers and consumers, as it highlights their core competencies and differentiators based on their digital software-based technology. Key takeaways from this whitepaper: Digital challengers separate companies from their customers Implementing digital capabilities for digital use cases Digital companies have a micro services-oriented, scalable IT architecture

Extend the value of your Qlik investment

By: Jedox

The most flexible Business Intelligence (BI) platform, QlikView, allows its users to gain valuable insights by understanding the fine line between the relevant data and the redundant data. It stimulates unrestricted analysis of application data, thus helping users make timely and accurate decisions. If you are already aware of the above mentioned BI platform, then here’s an investment solution that would add on to the values of your Qlik investment. This white paper reveals the concealed facet of the same BI tool that could be coherently integrated with an extension facilitating freedom and flexibility for everyone in the company, in terms of analyzing planning data. This QlikView white paper unfolds how you can enhance your Qlik system with data capture and write-back to the database as well as specific planning functionality such as easy top-down planning and driver-based bottom-up planning, unifying Business Intelligence (BI) with Corporate Performance Management (CPM).

What is

What is Risk Management ?

Risk management is the way of identifying, measuring and dealing with the threats to an organizations capital and earnings. Definition according to ISO 31000 Risk management is the way toward assessing the chance of loss or damage and finding a way to battle the potential Risk.

What is Risk ?

The risk is the possibility that something bad or unpleasant (exposure to the chance of injury or loss) will happen. Organizations are exposed to risks of different degrees; risk management is a procedure which involves assessing the risks and then taking necessary steps to either eliminate or to reduce them as far as reasonably possible.

What is Network security ?

Network security is the bond of activities and policies designed to protect unaccredited usability and integrity of network, data or network accessible resources. Computer networks that are involved in regular transactions within government or business parties require security, most commonly by assigning the network a unique name and a corresponding password. Alongside firewall that manages and regulates the network traffic based on certain protocols