Director of Application Development
Why it's Crucial to Have a Corporate Mobile Device Policy
The more we rely on mobile devices as vehicles for business communications and entertainment, the more data we create and consume. For every additional bit and byte that is born in the ether, there is a heightened chance that the information will become fodder for eDiscovery. Despite this...
Unique eDiscovery Challenges with Mobile Device Data and How to Solve Them
The core issue in Healthwerks, Inc. v. Stryker Spine, et. al, (Case No. 14-cv-93-pp.) involves alleged breaches of non-compete contracts. However, a "late-filed motion" by Plaintiff to compel additional discovery prompted Honorable US District Judge Pamela Pepper to issue a ruling relating to the after-the-buzzer admissibility of text...
4 Things to Consider about iPhone OS for an MDM Policy
As consumer technology continues to infiltrate the corporate working environment, a proper information governance strategy is paramount to ensure that valuable business information is retained while stale data is purged to reduce legal and regulatory risk exposure. Popular mobile devices all have unique operating systems - providing...
Text Messages in eDiscovery: Recovery, Retention, and Preservation
Once an organization maps an inventory of its own unique portfolio of cell phones and tablets, a consistent and repeatable process should be instituted in order to ensure data is properly identified, preserved, and considered for use in internal investigations, regulatory and law enforcement scenarios, and eDiscovery proceedings. This...
5 Cases that Highlight the Challenges of Mobile Device Preservation
This post summarizes five recent judicial experiences littered with examples of litigants grappling with issues of mobile device preservation. As mobile device usage and capabilities increase, the importance of the ever-slimmer gadgets as potential sources of electronically stored information (ESI) becomes undeniable. The more we rely on these accessories as v...
Applying Keywords Prior to Predictive Coding: A Judgment Call
Chalk it up to geographical coincidence, but the site of this year’s ILTA conference recently bore witness to another landmark judicial decision about the culling of eDiscovery materials. In a brief, three-page assessment from Nashville Magistrate Judge Joe Brown, the intersection of keywords and predictive coding is finally addressed. Or...
When Data Trumps Documents as Evidence
Although most electronic evidence in civil litigation comprises documents in the form of e-mails, word processing, spreadsheet, and presentation files, electronic data discovery (EDD) is really all about data. Data is all around you; it’s visible, hidden, expected, and unexpected. One thing that’s certain in 2014, however, is t...
A Quick Guide to eDiscovery Production Formatting Options
Among the various topics to be discussed at the Rule 26(f) Meet and Confer powwow, no subject is given less attention than the form and format of the eventual discovery productions themselves. A valid argument can be made that detailing and agreeing upon a format of production so early...
4 Tips to Help Make or Contest a Plausible ESI Inaccessibility Argument
“Our backup tapes are inaccessible and unduly burdensome to restore.“ “Our sales executive is very busy and her iPad will be too difficult and expensive to acquire.” “Yes, we have an e-mail archive system, but running searches and exporting the results is a slow process and will consume too much time and e...
5 Tips for An Effective 30(b)(6) Deposition
It’s not difficult to imagine a discovery scenario where your adversary claims they have diligently fulfilled their evidentiary obligations and that the small handful of documents they produced to you comprises the true universe of relevant, non-privileged information… but you don’t believe them. With the advent of electronic discov...
Google Glass and the Impending Wave of Wearable Technology
Google Glass has caused quite a stir since it was released to developers in February 2013. Since then, the possible uses for the optical head-mounted display (OHMD) technology in the legal community have spanned the gamut from the practical to the ridiculous. Challenges to Optical Head-Mounted Display Adoption Despite a price...
What if conceptual analytics could be applied to photos in eDiscovery and Litigation Review?
Merely a decade ago, most discovery projects involved storage warehouses and filing cabinets full of paper. Everyone cheered when Optical Character Recognition (OCR) showed up to the party, and the ensuing fracas lead to the conception of traditional keyword searching. Fast forward to 2014: even the most mundane eDiscovery project showcases...
6 New Features of Microsoft's Exchange Server: Trick or Treat? - Part 2
In Part I of D4’s Exchange 2013 Trick-or-Treat series, we showcased a few of the new eDiscovery features in Exchange 2013. This installment is all about sharing, the ways that Exchange 2013 and its buddy SharePoint work together, and assisting those who prefer to keep their chocolate doubloons to themselves.*FEATURE #4: Site Ma...
6 New Features of Microsoft's Exchange Server: Trick or Treat? - Part I
It’s been quite a while since I slipped on a white sheet with eye-holes and spooked my neighbors into giving me candy. It’s also been quite a while since Microsoft released a new version of its flagship Exchange Server messaging platform, but the latest release promises to make...
Changing the Odds in your Favor with Predictive Coding
If you thought predictive coding made its very first trip to Las Vegas this year to attend ILTA, I sincerely hope you didn’t double-down your bet. Predictive technologies, in some form, have been Las Vegas residents for a few years now, silently outsmarting poker players from behind those shiny, fe...
Did I Download That?! A Brief Discussion of BitTorrent and Copyright Law
If you haven’t purchased a CD since 2000, or a DVD since 2010, you are in very good company. Media sources like satellite TV, iTunes, Netflix, and Amazon Prime have teamed up with super high definition Plasma, LCD, and LED televisions powered by Roku boxes and PlayStations to give you very li...
My Big Fat Data Wedding
Although this blog post is about Big Data, it will not feature stock photos of the tip of an iceberg bobbing peacefully around the sea while the giant frozen mass that comprises its core is hidden beneath the water’s surface. In true e-discovery pundit form, however, its title contains a...
Discovery of Anti-Social Media
You’ll find it all on Facebook: rants, raves, likes, status updates, and pictures of smiling friends on vacation or at happy hour having the time of their lives. Switch your browser tab over to LinkedIn and you’ll see who recommends your colleagues, what ground-breaking initiatives they’re working on, an...
Bacon, Eggs and a Tall Glass of Predictive Analytics
You know that 100% pure orange juice you buy at the grocery store? The all-natural one, never from concentrate, that contains nothing but juice from the roundest hand-picked Florida oranges with the cutest dimples. The one that contains no preservatives, added sugar, or high fructose corn syrup. The one that always...
Observations of a Recovering BigLaw Technologist: Part II: Relationship Status - "It's Complicated"
In Part One of “Observations” we took a brief look under the hood of an e-discovery service provider and addressed some of the preconceived notions about how they operate. Now that I’ve crossed over to the dark side, and in honor of Valentine’s Day 2013, I’d like to discuss so...
About Josh Headley
Josh Headley brings 10 years of both hands-on technical and consultative experience to his role as Director of Litigation Support Analysts and Application Development. Josh’s range of expertise includes systems analysis, engineering, and eDiscovery consulting.
Coming to D4 from Nixon Peabody LLP– an AMLAW 100 law firm where he spent six years honing his eDiscovery and litigation support consulting skills – Josh is an invaluable resource for managing large-scale collection and review efforts.
Josh has also become an expert in guiding clients through the discovery of ESI through in-depth dialogs with information technology personnel, senior management, legal counsel, and forensic experts. He has conducted numerous custodian interviews, participated in 30(b)(6) depositions of IT personnel, developed data maps of corporate information systems, consulted on large-scale class action law suits, and has performed expert wage data analysis in Federal labor and employment matters.
By keeping his technical skills sharp – with demonstrable expertise in a number of popular eDiscovery applications, including LAW, MS SQL Server, FTK, Relativity, and DT Search – Josh is able to act as a more effective consultant, giving clients all of the information they need to make proactive, informed decisions.
Josh holds a bachelor’s degree in Business Information Systems with a minor in Finance from SUNY Geneseo, and an MBA in Finance from the Rochester Institute of Technology. Additionally, Josh has achieved PMP certification in project management, CCE certification in computer forensics, and recently completed the RCSP (Relativity Certified Sales Professional) program.
Recent Articles from Discover More
Posted November 16, 2017
5 Workflow Tips for Conducting a Foreign Language Review
Posted November 10, 2017
What You Need to Know About Managed Review and the eDiscovery Process
Posted November 02, 2017
7 Steps to Help You Defensibly Migrate eDiscovery Data
Posted October 27, 2017
CLE Webinar with Lewis Brisbois: How to Do Social Media Collection and Presentation Right
Posted October 26, 2017
Despite Clawback, Defendant’s Reckless Abandon of Rule 502 Bites Back
Posted October 20, 2017
How to Use the eDiscovery PST Export Tool in Office 365 E3
Posted October 12, 2017
Recent eDiscovery Cases for Mobile Phones and Social Media
Posted October 05, 2017
Raising Objections to the Format of ESI Productions: Do it Early and Do it Clearly
Posted September 27, 2017
5 Reasons eDiscovery Alternative Fee Models Make Sense for You
Posted September 22, 2017
Why it's Crucial to Have a Corporate Mobile Device Policy