7 Best Practices for a Defensible Legal Hold Process
Legal holds may be issued in a wide variety of circumstances including actual, imminent, or anticipated government investigations . Obvious situations arise when notice is received, when a government agency files notice, restatement of public companies earnings or when similar circumstances within the corporation or business have previously led to legal...
BYOD Privacy: 6 Considerations to Protect Your Business
We live in a world where corporations are working harder than ever to balance legal and regulatory obligations with business efficiency. This continued expansion of electronic data, partnered with the blurred lines between business and personal information, is straining already stretched legal departments. All of this leads ...
3 Benefits of Managed Review
Are you familiar with managed review ? For those who aren’t, the key differentiator in the managed review process is the project manager. This person oversees the entire review, as well as the individual document reviewers. Why do you need a Project Manager leading your review team, you ask? Wh...
How Data Repurposing Can Lower the Cost of Discovery
Welcome to the 21 st Century: the age of exponentially increasing data volumes, both national and international data managed by global corporations, reluctance to delete, and reaction to litigation, government investigations, and internal audits. All this, and more, resulting in ever increasing eDiscovery budgets. So, what can we do to...
Corporate Internal Investigations Best Practices
Corporate Internal Investigations Best Practices from D4 An estimated 93% of all data created by corporations is in the electronic format. Subsequently, the number of sanctions levied against parties who improperly handle electronic evidence continues to increase. Here are 11 best practices that should be followed when planning and conducting...
4 Key Internal Roles Involved with Conducting Corporate Investigations
As forensic examiners, one of the most common types of cases we help our clients with is internal investigations. This can mean different things to different organizations, but the purpose of this discussion focuses on employee malfeasance. When faced with an internal investigation, companies, government entities, educational institutions and other...
Intellectual Property Theft: How to Ensure a Defensible Investigation
Digital forensic investigations involving corporate and private entities come in a wide variety, such as: copyright infringement, theft of personally identifiable information, violation of workplace policies, wrongful termination of employment, network intrusion, wrongful death, divorce and more. Yet, the most prevalent type of investigation the Forensics Services Group handles...
Could the Amazon Echo be a New Source of ESI?
This article was originally published on the Daily Record. One of the coolest gadgets that made it down my chimney this Christmas was the Amazon Echo. You’re not familiar with the Echo? The Echo is billed as a personal digital assistant. Basically it’s a Bluetooth enabled speaker that...
Information Governance Policies: The Fundamental Building Block to eDiscovery
The continued expansion of electronic data combined with the blurring of lines between business and personal information is straining already stretched legal departments. Like any worthwhile endeavor a stable base is needed upon which to set your foundation. For years document review has been synonymous with electronic discovery. This stage...
4 Urban Legends about Analytics and e-Discovery
This blog was originally published on the Relativity Blog on June 21, 2016 by Stan Pierson. You’ll find urban legends in every culture—including stories of Bigfoot in the northern hemisphere, and the chupacabra down south. Look closely, and you might find some interesting legends in the professional world, too. (Ev...
Previous Page Next Page
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted May 17, 2017
How to Comply with 21 CFR and HIPAA Data Retention Requirements
Posted May 11, 2017
4 Key Advantages of Conducting Remote Depositions
Posted May 03, 2017
eDiscovery in International Dispute Resolution: What Experts Want You to Know
Posted April 27, 2017
China Expands Data Transfer Requirements for its Cybersecurity Law
Posted April 26, 2017
How to Use Office 365 Advanced eDiscovery to Prioritize Your Review
Posted April 21, 2017
American Bar Association Section of International Law | 2017 Spring Meeting in Washington DC
Posted April 19, 2017
Office 365 Enterprise E5: 6 Features That Could Benefit Your Business
Posted April 12, 2017
Data Reuse in eDiscovery: 4 Questions to Help Start Your Policy
Posted April 05, 2017
ESI Data Mapping Basics for eDiscovery
Posted March 30, 2017
China’s Cybersecurity Law: Objectives, Compliance and Business Recommendations