Posted on: April 01, 2016in White Papers
Cloud ESI in eDiscovery: Best Practices for Corporate Counsel
This post was co-authored by Tom Groom and Peter Coons.
Cloud computing continues to expand at a rapid pace; businesses use the ubiquitous “cloud” for everything from communication to collaboration, accounting and document storage. Regardless of the size of the organization, cloud computing provides its users significant cost savings and improved workflows.
Though the ease of cloud computing cannot be denied, there are significant ramifications for legal teams; how is Electronically Stored Information stored? When discovery is required, where do you even start?
This eBook discusses how counsel can apply traditional methods of custodian interviews and proper documentation to data that is stored in the cloud, ensuring that relevant ESI is both preserved and able to be collected.
Download this eBook to learn the following about cloud-based ESI:
- Who to interview and what to ask in order to identify where potentially relevant ESI is stored
- How to ensure preservation when a legal hold has been issued
- How to conduct a defensible data collection from the cloud
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted June 21, 2017
Control Litigation Costs by Making the Most of Your Internal Capabilities
Posted June 15, 2017
Shanghai OSAC Quarterly Meeting
Posted June 15, 2017
5 Ways to Reduce eDiscovery Costs Before and During Litigation
Posted June 07, 2017
Defensible Deletion Strategy: Getting Rid of Your Unnecessary Data
Posted May 31, 2017
How Does the EU-US Privacy Shield Affect Cross-Border Discovery?
Posted May 24, 2017
Unique eDiscovery Challenges with Mobile Device Data and How to Solve Them
Posted May 17, 2017
How to Comply with 21 CFR and HIPAA Data Retention Requirements
Posted May 11, 2017
4 Key Advantages of Conducting Remote Depositions
Posted May 03, 2017
eDiscovery in International Dispute Resolution: What Experts Want You to Know
Posted April 27, 2017
China Expands Data Transfer Requirements for its Cybersecurity Law