Our forte is litigation support. Our distinction is intuition.
John Holland, Chief Executive OfficerPlay Video
Fuse human powers such as knowledge and inventiveness with tech ones like capabilities and tools, and this is what you get: insights more exacting, analytics more profound, and data more secure than ever before. We are D4—a technology company of people.
The Latest from Discover More
5 Fundamental Benefits of Managed Services PartnershipsPosted April 17, 2015
A managed services partner can benefit from a figurative bucket full of eDiscovery, technology, and human services for one flat, predictable price. This article was originally published on LinkedIn Pulse. A managed services offering is akin to a pay-by-the-container buffet. Just as one fills a flimsy plastic take out container to the brim with as many gastronomically-complementary items as will fit for $11.99 flat, a managed services partner can benefit from a figurative bucket full of eDiscovery, technology, and...
9 Reasons Microsoft Outlook Is Not a Litigation Review ToolPosted April 15, 2015
Shortcuts may actually take you the long way around. Here are nine solid reasons why legal teams should never use Outlook to review their client’s email data. Although email data can come in many formats, the format we see in eDiscovery projects most often at D4 are PST and MSG files from Microsoft Outlook. With Microsoft Outlook being a fairly standard application that almost everyone has access to, legal teams have a tendency to do “quick reviews” of email data i...
Managed Services Justified: How to Achieve Stakeholder Buy-In [Webinar]Posted April 10, 2015
Perceived risks and binding contracts may give stakeholders doubt about Managed Services. Learn how to get ‘the Board’ on board – from those with direct experience. April 30, 2015 | 1:00 p.m. EST Duration: 1 hour Meet the Panelists Stuart B. Claire Manager of Litigation Technology SupportBuchanan, Ingersoll, & Rooney Jennifer Lemire Senior Litigation ParalegalThe RiverStone Group (A Fairfax Company) [Moderator] Elissa Livingston, J.D. Director of Project Management D4, LLCRegister Now Join us on Thursday, April 30th to arm yourself with knowledge only t...
How to Recover Deleted Emails with PST File CorruptionPosted April 08, 2015
Corrupting, then immediately repairing, a PST file in hopes of recovering deleted emails may sound counter-intuitive, but here is why it makes sense. When it comes to eDiscovery, how far is too far? For example, if there is an easy method for potentially recovering deleted files, should this be incorporated into typical eDiscovery practices? This is certainly a consideration when working with emails during the discovery process. The question on how to handle deleted emails often comes to mind when...
20 Best Practices for Using Keyword Searches in eDiscoveryPosted April 01, 2015
Follow these best practice tips when using keyword searches for collection, data culling before and during document review, and post-review for deposition prep.By Peter Coons, SVP of D4, and Tom Groom, VP and Sr. Consultant at D4 Over the years we have keyword searched thousands of hard drives, e-mail stores, thumb drives, CD’s and servers. Using keywords to identify potentially relevant documents remains as a common practice in the eDiscovery world even with Predictive Analytics on the scene. Wh...
ESI Processing Simplified – What Every Legal Team Should KnowPosted March 25, 2015
This post answers the following questions about ESI processing during eDiscovery: What is it? Why is it an essential step? Why does it take so long? Recently, I summarized the eDiscovery process in three simple phases: Phase 1 - Identification, Preservation, Collection, Phase 2 - Data Analysis, Reduction, Analytics and Phase 3 - Processing, Review, Production, as well as discussed the risks that legal teams face when they choose not to follow the process. In this post I want to focus specifically on...
eDiscovery Update: Going Off-the-Grid with Smartphone AppsPosted March 25, 2015
“Spoken words disappear after they’re heard. But what you say online remains forever. With confidential messages that self-destruct, Confide lets you avoid the Cloud, and takes you off the record.” The above quote is from the website getconfide.com, which offers an off-the-record messenger application that can be installed on a smartphone. All you need to surreptitiously communicate with another party is their email address or phone number. There are a quite a few of these apps floating around, and ap...
The eDiscovery Process Simplified – What Every Legal Team Should KnowPosted March 17, 2015
This post breaks down the eDiscovery process into three key phases and explains simply what every legal team should know and why they should care. The latest eDiscovery hot topic revolves around a Federal Judge Survey that highlights a key point, in which we at D4 are not surprised by: after all these years of talking about eDiscovery, the majority of attorneys, and the legal industry overall, still don’t understand the eDiscovery process and how to properly handle Electronically St...
5 Helpful Tips on Running Basic Searches in RelativityPosted March 12, 2015
Have you ever had problems with long-running queries in Relativity? Here are some best practices to help make your searches run faster.1. If your search only includes a specific range of documents, or documents in a specific tag, always make sure you enter those conditions first.This will allow the system to cull down to the specified group before running any keywords or metadata conditions. I have also found that by adding all of the “OR” conditions before adding the...
Intellectual Property Theft Investigations: Find the Smoking GunPosted March 03, 2015
Learn how to properly conduct a digital forensic investigation to find key evidence without damaging your IP theft case. Digital forensic investigations involving corporate and private entities come in a wide variety, such as: copyright infringement, theft of personally identifiable information, violation of workplace policies, wrongful termination of employment, network intrusion, wrongful death, divorce and more. Yet, the most prevalent type of investigation the Forensics Services Group handles at D4 is intellectual property (IP) theft perpetrated by an “insider.” The insi...