Canopy Blog: Ediscovery

Canopy Talks Data Privacy, Cybersecurity, & Breach Response with “The Data Diva”
Having journeyed from ediscovery into data breach response, Adi Elliott knows emerging technologies. And as Canopy’s chief revenue officer, he’s also an authority on applying AI..

Square Peg, Round Hole: Why Ediscovery Isn’t a Good Fit for Data Breach Response
“Can I use ediscovery to respond to a data breach?” Technically, the answer is “yes,” — but should you? That’s the real question, and a wrong decision could compromise your..

Data Mining for Protected Data with Canopy
Canopy Software recently released a case study highlighting how our data mining innovations decrease the time our customers spend on protected-data discovery and data breach..

9 Differences Between Data Breach and Litigation Reviews
In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..

Challenging Convention: Ediscovery Software Shouldn't Be Used for Data Breach Response
Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..