You Can't Manage What You Don't Measure™

ACEDS eDiscovery Conference Panel

Panel Topic: Do-it-Yourself Legal Holds: Best Practices for Doing More with Less

Our CEO, Allison Walton, recently moderated a panel concerning the minimal components to comply with legal hold deployment at the ACEDS eDiscovery Conference.

Experts from across the e-discovery spectrum tell you how to

  • Identify, budget and allocate resources efficiently
  • Shoestring a legally-defensible legal hold process
  • Establish the appropriate corresponding policies
  • Develop a litigation response plan that identifies trigger events, custodians and data sources
  • Implement compliance tracking and plan for a legal hold release


Michael Dixon, CEDS, Sharon O’Bryan, Barry Schwartz

Click to listen to the Panel Discussion speaker

ACEDS Article: In the crosshairs of cybercrime: Essential lessons from the Target data breach

ACEDS Article: In the crosshairs of cybercrime: Essential lessons from the Target data breachLatest article by Allison Walton, our Fortis Quay CEO, about cybercrime and the essential lessons we can learn from the Target data breach.


It is important for the persons responsible for applying legal holds to understand that data breach applies to a very broad group of incidences. It can take the form of phishing, hacking, malware, physical theft, and other events. 

Click here to read the entire article.

Legal Hold Demo

Ensure that employees understand their obligations for legal hold and reduce risk for the organization


Watch the Demo

eDiscovery Best Practices

This module is an indispensable tool for organizations that want to reduce the costs and risks associated with litigation.


Watch the Demo

Want to be a Quay Partner?

If your organization would like to explore these opportunities, please contact us with your ideas.


Inquire Now

Contact Us

(877) 463-QUAY
Fortis Quay, Inc.

Definition: Fortis Quay

Fortis Quay/ fȯr-təs kē / 

: Your safe harbor from the digital storm

: Measureable results for better information management

: Best practices for eRisk reduction and defensible eDiscovery

: Remember, You Can’t Manage What You Don’t Measure™