Tagged with: Data Collection
How to Use the eDiscovery PST Export Tool in Office 365 E3
If a company currently uses a cloud-based email solution, or are entertaining the idea of switching over to one in the near future, both inside and outside counsel should be aware of the system’s built-in preservation and collection capabilities and how to operate them. One of...
Data Reuse in eDiscovery: 4 Questions to Help Start Your Policy
The subject of reusing data by organizations that are involved in serial litigation is a popular topic of discussion, and often is seen as ideal, if not often practiced. It is more of a necessity these days because organizations are doubling their data footprint annually, resulting in billions being...
How Data Repurposing Can Lower the Cost of Discovery
Welcome to the 21st Century: the age of exponentially increasing data volumes, both national and international data managed by global corporations, reluctance to delete, and reaction to litigation, government investigations, and internal audits. All this, and more, resulting in ever increasing eDiscovery budgets. So, what can we do to...
How to Handle Salesforce ESI Discovery Requests
Did you just a get a request to preserve ESI in Salesforce (“SFDC”) and you’re wondering what to do? Do you call Salesforce and ask them to preserve and send a copy of your information? Would you call Mark Zuckerberg if you had to preserve Facebook posts? T...
International eDiscovery: How to Handle Data Transfer Restrictions in China
With investigations and litigation becoming more common in China, there has been a growing need for eDiscovery services to be established inside the Great Chinese Firewall. Frankly, the concept of eDiscovery is new to China, and the procedures surrounding it are still developing. In a country where discovery simply isn’t pr...
Understanding Cloud Email Discovery and Collection Options
Email data residing in the cloud is not fundamentally different than email data contained in a traditional, on premise server. However, the means of accessing cloud-based email certainly differs and poses unique challenges compared to traditional collections. This white paper will give you sufficient knowledge about cloud email discovery, which...
How to Document Your Chain of Custody and Why It's Important
The collection process is the crux of any investigation, and the most important step in any collection is documentation. Proper documentation and the ability to validate the findings are essential when a matter goes to trial, especially when the duration of a case lasts for months or years. Evidence that...
Around the World in 8 Days: A Remote Collection Success Story
200 desktops, 24 servers, 3 countries, and 15 days to collect all the data…Remote collection method prevents case from becoming an expensive ESI nightmare. The demand for remote ESI collections is rapidly increasing. For many situations, legal teams prefer this method over on-site data collections due to its convenience and the tremendous...
When to Do a Remote Forensics Collection and 5 More FAQs
When should I request a remote collection over on-site? What does the remote collection process look like? Is it defensible? Is the remotely collected data secure and encrypted? I was recently on a call with a client where we discussed the various methods of remote ESI collection. Both of us...
Dos & Don'ts of Handling Data Received from Clients and Opposing Counsel
This post addresses steps legal teams should take and missteps to avoid upon receiving evidence collected by clients and production data sets from opposing counsel.There have been multiple posts published around the best ways to identify, collect, analyze, review and produce data. This post will not revisit those discussions,...
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted January 18, 2018
5 Expert Predictions for the eDiscovery Industry in 2018
Posted January 17, 2018
Get Your Passport to GDPR Success - LegalTech New York 2018
Posted January 11, 2018
Is Your Organization Vulnerable to a Cyber Attack? 3 Steps to Put Your Mind at Ease
Posted January 04, 2018
How the EU and China Plan to Deal with Multinational Data
Posted December 28, 2017
How to Navigate International Data Privacy Laws for eDiscovery
Posted December 21, 2017
Cross-Border eDiscovery: An Introduction to Cultural and Legal Obstacles
Posted December 14, 2017
Webinar Q&A Featuring Panelists from Special Counsel and Brainspace
Posted November 30, 2017
Help Your Employees Find the Information They Need with Machine Learning
Posted November 22, 2017
How to Use Managed and Prioritized Workflows to Reduce the Cost of Review [On-Demand Webinar]
Posted November 16, 2017
5 Workflow Tips for Conducting a Foreign Language Review