4 Key Internal Roles Involved with Conducting Corporate Investigations
As forensic examiners, one of the most common types of cases we help our clients with is internal investigations. This can mean different things to different organizations, but the purpose of this discussion focuses on employee malfeasance. When faced with an internal investigation, companies, government entities, educational institutions and other...
Intellectual Property Theft: How to Ensure a Defensible Investigation
Digital forensic investigations involving corporate and private entities come in a wide variety, such as: copyright infringement, theft of personally identifiable information, violation of workplace policies, wrongful termination of employment, network intrusion, wrongful death, divorce and more. Yet, the most prevalent type of investigation the Forensics Services Group handles...
Could the Amazon Echo be a New Source of ESI?
This article was originally published on the Daily Record. One of the coolest gadgets that made it down my chimney this Christmas was the Amazon Echo. You’re not familiar with the Echo? The Echo is billed as a personal digital assistant. Basically it’s a Bluetooth enabled speaker that...
Information Governance Policies: The Fundamental Building Block to eDiscovery
The continued expansion of electronic data combined with the blurring of lines between business and personal information is straining already stretched legal departments. Like any worthwhile endeavor a stable base is needed upon which to set your foundation. For years document review has been synonymous with electronic discovery. This stage...
4 Urban Legends about Analytics and e-Discovery
This blog was originally published on the Relativity Blog on June 21, 2016 by Stan Pierson. You’ll find urban legends in every culture—including stories of Bigfoot in the northern hemisphere, and the chupacabra down south. Look closely, and you might find some interesting legends in the professional world, too. (Ev...
Legal Hold Triggers: When Should You Document Your Reasonable Anticipation of Litigation?
When our corporate clients ask us to help with litigation response planning or legal hold protocols, one of the questions we ask is whether for any particular dispute they document their expectation of litigation. Here are some typical responses: "There is not always consensus that we have a reasonable expectation...
5 New Year's Resolutions from an Experienced eDiscovery Team
With each New Year comes a plethora of new gym memberships, healthy eating, better budgeting and countless other goals that individuals set for the upcoming 365 days. Setting either personal or professional resolutions should take in account the previous year, to help identify areas that need progress. The concept of...
Creating Strategic eDiscovery Workflows for Small Teams
The need to create and implement time and cost effective discovery-related workflows is not limited to just large firms, or for large discovery projects. Too many times, small to mid-size firms fall into the trap of thinking that defined and documented workflows are not necessary because the data sizes...
Predictive Coding vs. Search Terms: Who Determines the Method of Review?
This blog was originally published on The Daily Record. Two recent cases in two different courts dealt with the issue of technology assisted review (“TAR”) and its use in discovery. At issue in each case was the plaintiffs desire for defendants to use TAR instead of relying on search terms to i...
5 Things You Need to Know About the Managed Review Process
Anyone who has directed managed document review projects will tell you this: No two managed reviews are the same. Even when a fact pattern of a new case seems (at the outset) strikingly similar to an old case, you can trust that a twist will arise that requires new case...
Previous Page Next Page
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted April 21, 2017
American Bar Association Section of International Law | 2017 Spring Meeting in Washington DC
Posted April 19, 2017
Office 365 Enterprise E5: 6 Features That Could Benefit Your Business
Posted April 12, 2017
Data Reuse in eDiscovery: 4 Questions to Help Start Your Policy
Posted April 05, 2017
ESI Data Mapping Basics for eDiscovery
Posted March 30, 2017
China’s Cybersecurity Law: Objectives, Compliance and Business Recommendations
Posted March 28, 2017
What will the future bring for the legal industry? | Q&A
Posted March 23, 2017
Beginner’s Guide to Litigation Response Planning and Execution
Posted March 16, 2017
7 Best Practices for a Defensible Legal Hold Process
Posted March 10, 2017
BYOD Privacy: 6 Considerations to Protect Your Business
Posted March 08, 2017
3 Benefits of Managed Review