Employee Spotlight: Joe Anguilano

Meet the Team Employee Spotlight: Joe Anguilano Title: Managing Director of Cybersecurity Location: Cleveland, OH How did you start at the company? In 2005, I was hired by JURINNOV (acquired by TCDI in 2016) as an intern during my senior year at John Carroll University. Upon graduation, I was brought on full-time as a Business Analyst. One [...]November 13, 2018 |

Top 10 Cybersecurity Tips for Organizations

“There are risks and costs to a program of action – but they are far less than the long range cost of comfortable inaction.” – John F. Kennedy 1. Have a written incident response plan and practice it on a regular basis. Time is of the essence when responding to a data breach. Every second […]

August 23, 2018 | Tim Opsitnick

Ohio House Testimony: Senate Bill 220

Senate Bill 220: Data Protection Act Written Testimony Timothy M. Opsitnick Technology Concepts & Design, Inc. (TCDI) June 27, 2018 Chairman Blessing and members of the Ohio House Government Oversight & Accountability Committee, my name is Tim Opsitnick. I am the Executive Vice President & General Counsel at Technology Concepts & Design, Inc. (TCDI), a […]

July 6, 2018 | Tim Opsitnick

Ohio Senate Testimony: Senate Bill 220

Senate Bill 220: Data Protection Act Testimony Timothy M. Opsitnick Technology Concepts & Design, Inc. (TCDI) January 10, 2018 Chairman Coley and members of the Ohio Senate Government Oversight & Reform Committee, my name is Tim Opsitnick. I am the Executive Vice President & General Counsel at Technology Concepts & Design, Inc. (TCDI), a company […]

July 6, 2018 | Tim Opsitnick

AI is the Student, Not the Teacher – The Importance of Human Driven TAR

Bill Gates once said that “technology is just a tool. In terms of getting the kids working together and motivating them, the teacher is the most important.”  If we think about that quote in terms of technology assisted review (TAR), the quote makes total sense. Members of my dev team and I were talking yesterday […]

July 6, 2018 | Caragh Landry

Legal Spend Analytics: Manage Your Costs Using Lean Six Sigma

We were at the ACC Legal Operations conference this week in Chicago, and once again Legal Spend Analytics (LSA) was a big topic of discussion. Attendees were from both large and small legal departments, and the issue exists for all of them. Am I doing this as efficiently and inexpensively as possible? Although LSA is […]

June 15, 2018 | Caragh Landry

Four Steps to Effective Cybersecurity Logging

The Importance of Cybersecurity Logging Logs are crucial elements to breach investigations.  However, some investigations suffer from a lack of logs.  In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines.  Some of […]

May 30, 2018 | Eric Vanderburg

TCDI and GDPR Compliance – How We’re Protecting Client Data

TCDI has taken great strides in our 30 years of business to safeguard our clients’ data and to ensure compliance with several national and global guidelines of data security, most notably, HIPAA, Safe Harbor, and most recently, the Privacy Shield. The GDPR, which goes into effect tomorrow, May 25th 2018, imposes new obligations and expands […]

May 24, 2018 | Caragh Landry

Passive Reporting with CVLynx

We are all very busy, and sometimes the smallest tasks seem like death by a million paper cuts.  As a Project or Case Manager, reporting can be one of those bazillion tasks that you have to do each day that drives you up a wall. Why can’t it be easier to get to the information […]

May 21, 2018 | Caragh Landry

The Responsibilities of Legal Operations Staff

As I just got back from CLOC last week, I continue to be amazed at the various roles and responsibilities shouldered by Legal Operations staff.  Still one of the fastest growing roles in legal departments, the responsibilities often assigned to these teams are varied and all over the map in terms of impact on the […]

May 4, 2018 | Caragh Landry

Request Info

TCDI | Computer Forensics | Cybersecurity | Litigation Technology