Discover MoreD4’s team of data and eDiscovery experts share their expertise so you can power your intellect with information that will help you do your job more efficiently.
Learn the difference between predictive coding and TAR. Understand these elements before creating an email retention policy. Consider these critical things before bringing eDiscovery in-house. Explore the three methods of forensic imaging.
And that’s just the beginning. If you can’t find the answers here, just let us know and we will find them for you.
Unique eDiscovery Challenges with Mobile Device Data and How to Solve Them
The core issue in Healthwerks, Inc. v. Stryker Spine , et. al, (Case No. 14-cv-93-pp.) involves alleged breaches of non-compete contracts. However, a "late-filed motion" by Plaintiff to compel additional discovery prompted Honorable US District Judge Pamela Pepper to issue a ruling relating to the after-the-buzzer admissibility of text...
How to Comply with 21 CFR and HIPAA Data Retention Requirements
As corporations move rapidly towards digitizing internal records and gathering more and more data from their consumers, it’s no surprise that data privacy is a concern shared by nearly every industry. But the healthcare industry in particular faces extreme pressure to comply with increasingly rigid regulations around protecting personally id...
4 Key Advantages of Conducting Remote Depositions
4 Key Advantages of Conducting Remote Depositions from D4 Do I need to travel to that deposition? New advances in technology have made this a question that attorneys need to be asking themselves before they plan to take a deposition. For example, let's say you need to conduct a four-hour deposition...
eDiscovery in International Dispute Resolution: What Experts Want You to Know
I was invited recently to attend the American Bar Association Section of International Law Spring Meeting in Washington DC and was honored by the opportunity to participate on a panel, “International Dispute Resolution – What Does the Evidence Say?” The panelists included: Vinson & Elkins Counsel Adrianne Goins , Esq. as organizer and mo...
China Expands Data Transfer Requirements for its Cybersecurity Law
As I explained earlier in my blog about understanding China’s Cybersecurity Law , China is unveiling its Cyber sovereignty strategy by releasing regulations, policy statements and guidelines over time. The latest release was on April 11, 2017, when the Cybersecurity Administration of China (CAC) released their draft of “Security Assessment Measures for Cros...
How to Use Office 365 Advanced eDiscovery to Prioritize Your Review
While my last blog focused specifically on features within Office 365 Enterprise E5 , the biggest differentiator between E3 and E5 is the advanced eDiscovery component. Advanced eDiscovery within Office 365 E5 builds on the existing set of eDiscovery capabilities but provides a more efficient and streamlined process to give you more...
American Bar Association Section of International Law | 2017 Spring Meeting in Washington DC
Wednesday, April 26th 4:30 PM – 5:30 PM American Bar Association Section of International Law , 2017 Spring Meeting in Washington DC "International Dispute Resolution: What Does The Evidence Say?" Chuck Kellner, senior vice president and senior consultant at D4, will give a presentation that addresses issues surrounding how discovery and ev...
Office 365 Enterprise E5: 6 Features That Could Benefit Your Business
Microsoft has made, and continues to make, billion dollar strides in artificial intelligence, automation, advanced security, threat protection, eDiscovery and advanced analytics . How can Microsoft solve your business, eDiscovery and advanced analytics challenges through their E5 enhancements? Office 365 is forcing a paradigm shift in the traditional eDiscovery process. Register...
Data Reuse in eDiscovery: 4 Questions to Help Start Your Policy
The subject of reusing data by organizations that are involved in serial litigation is a popular topic of discussion, and often is seen as ideal, if not often practiced. It is more of a necessity these days because organizations are doubling their data footprint annually, resulting in billions being...
ESI Data Mapping Basics for eDiscovery
What is data mapping? A data map is a comprehensive and defensible inventory of a corporation’s IT systems that store information, which may be relevant to litigation and other proceedings. Creating your data map is only one small step you should take when defensibly preparing fo...
Previous Page Next Page
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted July 13, 2017
How to Use Office 365 and X1 Discovery to Achieve Your Team's eDiscovery Goals [Webinar]
Posted July 12, 2017
Microsoft Office 365 is Disrupting the eDiscovery Industry in a Major and Permanent Fashion
Posted July 06, 2017
China's Cybersecurity Strategy: 5 Updates You Need to Know
Posted July 05, 2017
3 Workflows to Enhance Your Document Review Process
Posted June 28, 2017
Should you be using TAR? Judge Peck recommends you do
Posted June 21, 2017
Control Litigation Costs by Making the Most of Your Internal Capabilities
Posted June 15, 2017
Shanghai OSAC Quarterly Meeting
Posted June 15, 2017
5 Ways to Reduce eDiscovery Costs Before and During Litigation
Posted June 07, 2017
Defensible Deletion Strategy: Getting Rid of Your Unnecessary Data
Posted May 31, 2017
How Does the EU-US Privacy Shield Affect Cross-Border Discovery?