Our forte is litigation support. Our distinction is intuition.
John Holland, Chief Executive OfficerPlay Video
Fuse human powers such as knowledge and inventiveness with tech ones like capabilities and tools, and this is what you get: insights more exacting, analytics more profound, and data more secure than ever before. We are D4—a technology company of people.
The Latest from Discover More
The Sedona Conference® Technology Review Panel 2015 UpdatePosted May 06, 2015
Hand-selected group of litigation support professionals highlight what they see on the legal technology horizon for the next five years. The Sedona Conference® Technology Review Panel or TRP (formerly RFP+ Vendor Panel) met last week to look at the current state of the legal industry and discuss things to come. The Sedona Conference® TRP comprises industry veterans from 30 different organizations, including software technology companies, a consulting organization, one representative each from a defense firm and a plaintiff firm, and two co...
eDiscovery Managed Services: How to Achieve Stakeholder Buy-In [Webinar On-Demand]Posted April 30, 2015
Perceived risks and binding contracts may give stakeholders doubt about managed services. Learn how to get ‘the Board’ on board – from those with direct experience.Duration: 1 hourAccess the On-Demand Webinar Is the thought of putting all eDiscovery eggs into one managed services basket making your stakeholders uneasy? Can you blame them? Known benefits aside, entering into a managed services partnership requires a paradigm shift to internal eDiscovery workflows and protocols, which can be an overwhelming thought. In this lively discussion, expert...
Innovative Analytics Workflows Found the Needle in a Pile of NeedlesPosted April 22, 2015
Case Study: Innovation, a deep understanding of analytics tools, and expert workflow implementation turns a review of 195,000 records into one of 400. What happens if you have a huge collection and suspect that only a tiny fraction of that collection is going to be responsive to the request for production? What do you do when you have to perform an internal investigation over a broad dataset that may or may not yield anything to support or deny the allegations that lead...
D4 to Host Complimentary Webinar on Achieving Stakeholder Buy-in for eDiscovery Managed ServicesPosted April 21, 2015
D4, a Leading Managed Data and Discovery Services Provider, Hosts Corporate and Law Firm Panelists to Share Insights Based on their Real-Life Experience with eDiscovery Managed Services SolutionsROCHESTER, NY- April 20, 2015 - D4, LLC , a national in eDiscovery managed services, litigation support, computer forensics and deposition solutions to law firms and corporations, today announced it will host a complimentary webinar on April 30th at 1:00PM EDT. Attendees will learn how to justify an eDiscovery managed services agreement for law firms or...
5 Fundamental Benefits of Managed Services PartnershipsPosted April 17, 2015
A managed services partner can benefit from a figurative bucket full of eDiscovery, technology, and human services for one flat, predictable price. This article was originally published on LinkedIn Pulse. A managed services offering is akin to a pay-by-the-container buffet. Just as one fills a flimsy plastic take out container to the brim with as many gastronomically-complementary items as will fit for $11.99 flat, a managed services partner can benefit from a figurative bucket full of eDiscovery, technology,...
9 Reasons Microsoft Outlook Is Not a Litigation Review ToolPosted April 15, 2015
Shortcuts may actually take you the long way around. Here are nine solid reasons why legal teams should never use Outlook to review their client’s email data. Although email data can come in many formats, the format we see in eDiscovery projects most often at D4 are PST and MSG files from Microsoft Outlook. With Microsoft Outlook being a fairly standard application that almost everyone has access to, legal teams have a tendency to do “quick reviews” of email data i...
How to Recover Deleted Emails with PST File CorruptionPosted April 08, 2015
Corrupting, then immediately repairing, a PST file in hopes of recovering deleted emails may sound counter-intuitive, but here is why it makes sense. When it comes to eDiscovery, how far is too far? For example, if there is an easy method for potentially recovering deleted files, should this be incorporated into typical eDiscovery practices? This is certainly a consideration when working with emails during the discovery process. The question on how to handle deleted emails often comes to mind when...
20 Best Practices for Using Keyword Searches in eDiscoveryPosted April 01, 2015
Follow these best practice tips when using keyword searches for collection, data culling before and during document review, and post-review for deposition prep.By Peter Coons, SVP of D4, and Tom Groom, VP and Sr. Consultant at D4 Over the years we have keyword searched thousands of hard drives, e-mail stores, thumb drives, CD’s and servers. Using keywords to identify potentially relevant documents remains as a common practice in the eDiscovery world even with Predictive Analytics on the scene. Wh...
ESI Processing Simplified – What Every Legal Team Should KnowPosted March 25, 2015
This post answers the following questions about ESI processing during eDiscovery: What is it? Why is it an essential step? Why does it take so long? Recently, I summarized the eDiscovery process in three simple phases: Phase 1 - Identification, Preservation, Collection, Phase 2 - Data Analysis, Reduction, Analytics and Phase 3 - Processing, Review, Production, as well as discussed the risks that legal teams face when they choose not to follow the process. In this post I want to focus specifically on...
eDiscovery Update: Going Off-the-Grid with Smartphone AppsPosted March 25, 2015
“Spoken words disappear after they’re heard. But what you say online remains forever. With confidential messages that self-destruct, Confide lets you avoid the Cloud, and takes you off the record.” The above quote is from the website getconfide.com, which offers an off-the-record messenger application that can be installed on a smartphone. All you need to surreptitiously communicate with another party is their email address or phone number. There are a quite a few of these apps floating around, and ap...