Call or Visit us Today sponsors

Size: px
Start display at page:

Download "Call or Visit us Today 800.263.0940 www.altep.com. sponsors 2007-2010"

Transcription

1 Topic Pack: Ten Pitfalls of e-discovery and Document Review Call or Visit us Today sponsors Consulting Forensics Paper Discovery Electronic Discovery Magnetic Media Discovery Hosting & Review Conversion

2 Ten Pitfalls of E-Discovery and Document Review Inside this Topic Pack: Self-learning Slides Focus Paper Sample Custodian Interview Form

3 Tireless Service It s 11:45 on a Friday night, and you still have roughly 13,000 documents to review. The discovery deadline is Monday at 3:00 PM. Other firms go home at five o clock, but for Altep, the race doesn t end just because the sun goes down. As part of your team, we ll be there, working right alongside you until the deadline is met. Period. Determined to Succeed Call or Visit us Today Consulting Forensics Paper Discovery Electronic Discovery Magnetic Media Discovery Hosting & Review Conversion

4 Ten Common Pitfalls of e-discovery Self-Learning Slides

5 What to Look Out For As available technologies and techniques evolve, litigation managers and Counsel are better informed, more experienced and increasingly empowered to process, organize and maintain large ESI collections. Even so, it s easy to fall victim to one of the ten most common pitfalls simple oversights that are easily avoided, but can have a disastrous effect on your data and your case. Innovative Litigation Solutions

6 Pitfall #1: Self-Collection Questionable procedures during self-collection of ESI can cast doubt on the validity of your data Electronically Stored Data can be sensitive to handlingsimply plugging in a hard drive can modify the metadata of stored files. Employing highly-trained professionals to perform collections will allow you to avoid unnecessary risks. Experienced and certified technicians are trained to collect and preserve your data in the most defensible manner, using the most current tools and procedures approved by the courts. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Innovative Litigation Solutions

7 Pitfall #2: Hidden Data Ignoring the possibility of hidden data can lead you to overlook responsive documents Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Detecting the presence of hidden data has become an increasingly more challenging endeavor as the complexity and variety of corporate electronic files evolves. Selecting a review platform that provides integrated true native review, and implementing a standard review protocol to ensure that suspect document types are identified and examined is essential. See the Sample Hidden Data Review Protocol and checklist in this Topic Pack. Innovative Litigation Solutions

8 Pitfall #3: Searching on File Extensions Documents with misnamed and missing file extensions will not be returned by a search for a specific file extension. There are a number of searching, filtering and culling techniques can be used to significantly reduce the size of data sets before review. However, using file extensions as a filtering mechanism has proven to be more of a risk than anything else. Files can be renamed with inaccurate extensions either accidentally or deliberately or stored with no extension at all. In either case, a file extension filter will not catch these documents. For the best, most defensible result, use a file identification tool that analyzes document headers to determine their true file type. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Innovative Litigation Solutions

9 Pitfall #4: Failing to Normalize Time Zones Document date/time stamps from different time zones can result in inconsistent files dates in the final production data set. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Large cases tend to involve many custodians in multiple locations and time zones. Industry standards call for normalizing document date/time stamps to Greenwich Mean Time. During validation of the proposed production data set, verify that the responsive documents are correctly produced with the appropriate time and date. Innovative Litigation Solutions

10 Pitfall # 5: Native Metadata In producing native files, you may unintentionally provide discoverable metadata to opposing counsel If you have agreed to provide specific metadata fields in a production, and to produce one or more specific file types in their native format, realize that the opposing party will be able to process the native files and extract all of the available metadata. To prevent this, provide the agreed-upon metadata in a load file, and then scrub the metadata from the native files in the production data set. Additionally, be sure to include an MD5 hash for each native file, to guard against claims of spoliation. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Innovative Litigation Solutions

11 Pitfall #6: Un-redacted Metadata Redacted images do not mean redacted metadata When you redact a TIFF file for production, only the information in the image is obfuscated. If you have agreed to provide metadata fields such as To, From, CC, BCC and Subject, opposing counsel may be able to discover critical information, even though the production images were redacted. As with native productions, scrub the load file of any protected information, and ensure that any elements that were redacted on the TIFFs are not accidentally included in the metadata. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Innovative Litigation Solutions

12 Pitfall #7: Using the Wrong Tools Choosing the wrong tools for the job can cost you in the long run Using a generic application that lacks appropriate capabilities to support a document review project can wind up costing a great deal more than what you saved when all is said and done. Document review is widely regarded as the most expensive aspect of discovery, and the bulk of the cost is associated with staffing. Quality review platforms offer near-duplicate detection and robust tagging features, as well as sophisticated searching, clustering and workflow management tools that can help you minimize the man-hours required to review the data completely and correctly. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Innovative Litigation Solutions

13 Pitfall #8: Custodian Interviews Ask the right questions Prior to collecting electronically stored information (ESI), it is important to interview persons of interest to identify all potential custodians and data sources. During custodian interviews, ask about specific terminology, code names and acronyms pertaining to the matter. This will help you locate potentially relevant documents. In addition, ask the custodians to provide a list of passwords for any protected documents in the population, to avoid the extra time and expense associated with decryption during processing. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 See the Sample Custodian Interview form in this Topic Pack Innovative Litigation Solutions

14 Pitfall #9: Using External Servers External servers pose a variety unacceptable security risks. Never communicate details of a case via sent over a public network (i.e., the Internet.) that is sent over the internet is subject to a long list of security concerns, including eavesdropping, spoofing, viruses, spyware, phishing and scams. Make sure that your case management and review protocols prohibit use of public for distribution of case information instead, use a secure, internal network. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Innovative Litigation Solutions

15 Pitfall #10: Irregular Quality and Productivity Tracking In a fast-paced document review, quality control and productivity tracking can quickly become a big challenge. Pitfall #1 Pitfall #2 Pitfall #3 Pitfall #4 Pitfall #5 Pitfall #6 Pitfall #7 Pitfall #8 Pitfall #9 Pitfall #10 Thorough, consistent tracking of project deliverables and regular assessments of their quality are critical for the efficiency, accuracy and defensibility of any document review project. Carefully consider the nature of the data involved, the technical skills and comfort levels of the available reviewers, and the anticipated timeline to production. Then choose a review tool that offers workflow and progress monitoring tools, reports on demand, and a streamlined method of performing end-of-project QC and audits. Innovative Litigation Solutions

16 Ten Common Pitfalls in ediscovery and Document Review Throughout the course of the last ten years, ediscovery techniques and technologies have evolved dramatically, and litigation support managers have become sophisticated consumers of discovery processing, hosting and review services. Nevertheless, simple missteps can still trip up even the most experienced litigation and data management teams. To reduce complexity, prevent errors and improve your bottom line, watch out for these common pitfalls: Pitfall #1 Self-Collection Having custodians collect and submit their own documents seems harmless enough after all, they know their files and storage habits better than anyone else, so using a self-collection process should save time and money. At first glance, the task of gathering up electronic data seems simple enough, and allowing custodians to self-collect seems like it will streamline the process, circumvent needless and time-consuming protocols, and provide the best means of acquiring the relevant information. However, self-collection can actually result in a variety of potentially serious problems: Spoliation. Since custodians are not trained in proper data collection procedures, they may inadvertently alter important information, especially in the document metadata, while copying the selected files. Under-collection. Custodians may set the threshold for relevant too high, and fail to collect enough material to meet the standards for due diligence. Chain of custody. When custodians are allowed to provide their own data, the chain of custody can be compromised. Improper handling, poor documentation and an incomplete procedure are common shortcomings of the self-collection method and any of these can call the chain of custody into question. Very often, the nature of the case will have a significant impact on your decisions with regard to self-collection. For example, in the rare circumstance in which custodians are located in a single facility, and the desired document population is well-known, recently created and readily identifiable, selfcollection may prove to be a viable option. However, in most circumstances, the risks far outweigh the benefits - opposing counsel may call the collection procedures into question, criticize the self-collection as biased, and attempt to cast doubt on the validity of the data itself. To ensure a complete, correct collection of all potentially relevant, documents, first make sure that you thoroughly inventory all possible data sources (see pitfall #8.) Then, use properly trained and certified collection professionals with experience in the use of write-blocks to ensure metadata integrity to perform the actual collection. Finally, ask for a review of the technician s chain of custody documentation and procedures before the collection begins this will familiarize 2010 Altep, Inc. All rights reserved. [ SE] www. altep.com Please contact Altep for permission to reprint or distribute this article. Page 1

17 you with the standards that are being employed, and allow you to address any areas you feel need attention. Pitfall #2 Hidden Data As the volume and complexity of electronic data in the workplace continues to evolve, litigation managers should take precautions to ensure that hidden data is not being overlooked during the review. Hidden data usually occurs in the form of hidden worksheets and cells within an Excel file, or Word documents with background-matching text. Your discovery strategy should support a thorough understanding of the file types that occur in a given data population (an early case assessment tool is vital for this) and should include a means of identifying document types which are likely to include hidden data. A robust document review platform that includes fully integrated native review is a critical component, since reviewers will be better able to quickly identify and examine hidden data in the documents native formats. Implementing a hidden-data identification protocol, which includes pre-tagging suspect data types and assigning them to more experienced reviewers, can also help you catch hidden data that could otherwise damage your case. Pitfall #3 Searching on File Extensions Data managers and ediscovery providers routinely use culling and filtering strategies to reduce the accumulated data set as much as possible, thus minimizing the amount of information that must be reviewed. Various techniques can be used, including de-duplication, de-nisting, and keyword or concept searching. At first glance, simply excluding irrelevant files based on their file extensions might seem like a reasonable approach to first-pass culling. Obviously, files with extensions like.exe,.dll and.ini will not be useful, or even readable. However, it is important to realize that misnamed and missing file extensions will not be returned by a search on specific extensions. Potentially relevant files may have been saved without any extension, or even deliberately renamed with a misleading extension. To avoid this pitfall, use a tool that analyzes file headers to determine the true file type, regardless of the extension, and removes unreadable types. Pitfall #4 Failing to Normalize Time Zones Very often, larger cases will include custodians whose physical locations span multiple time zones. When documents are collected, their date and time stamps will likely appear to be disparate and non-sequential, which can be confusing and even misleading, especially where threads are concerned. Worse, if the documents are de-duplicated using date and/or time as a factor of 2010 Altep, Inc. All rights reserved. [ SE] www. altep.com Please contact Altep for permission to reprint or distribute this article. Page 2

18 comparison, and the date/time stamps are not standardized, the de-duplication will be incomplete and incorrect. You can avoid this common pitfall by simply ensuring that your discovery processing includes standardization of date/time stamps to Greenwich Mean Time across the entire document population. Additionally, when verifying the production data set, ensure that the responsive images were produced with standardized GMT date/time. Pitfall #5 Native Metadata Reviewing documents in their native format can increase productivity while improving thoroughness and accuracy. However, review managers should remember that native files will retain their metadata when produced. If you have agreed to provide specific metadata fields in a load file, and also agreed to produce particular file types in native format, the opposing party will be able process your produced files and extract all available metadata - even information you didn t specifically agree to provide. To prevent this, provide the metadata in load file and then scrub the metadata from the native files which are to be produced. This ensures that only the agreed-upon metadata is provided to the opposing party. Additionally, when producing files in native format, be sure to include a hash file for each native file on the production disk. This file can be used to safeguard the native file and the production against claims of spoliation. Pitfall #6 Un-redacted Metadata Depending on the nature of your case, you may choose to simply redact sensitive information from responsive images, rather than withhold the images and risk a challenge from the opposition. However, care should be taken when producing both redacted TIFFs and metadata in a load file. If you have agreed to provide metadata fields such as To, From, CC, BCC, sentdate and Subject, opposing counsel may be able to discover critical information, even though the production images were redacted. Be sure to scrub the correlating metadata in the load file to ensure that data elements which were redacted on the TIFFs are not accidentally included in the metadata. Pitfall #7 Using the Wrong Tools There are any number of document repository and file sharing platforms on the market today. At first glance, these applications may seem like viable and cheaper alternatives for discovery and review. However, using an application that is not designed specifically for legal document review can cost you in the long run Altep, Inc. All rights reserved. [ SE] www. altep.com Please contact Altep for permission to reprint or distribute this article. Page 3

19 Legal document review platforms offer robust tagging and workflow management tools that generic document repository applications lack tools that can help you identify, organize and assign documents for review. Documents can be grouped according to the criteria you select for example, key concepts or privilege claims. Additionally, many of these platforms provide integrated tools such as concept searching and clustering, near-duplicate detection, threading and tiff-on-the-fly. These features make it easy to ensure that all documents are reviewed properly and that only the responsive documents are included in the production set. Be sure to select a review platform that s appropriate for your reviewers technical skill set and comfort level, and thoroughly familiarize yourself with the application s feature set to ensure that it is appropriate for the type of files you ll be reviewing. In the long run, you ll likely save time and money by using the right tool for the job. Pitfall #8 Custodian Interviews Custodian interviews are an important preparatory step that can offer important insights into the nature and location of potentially relevant information. Prior to collecting any ESI, interview persons of interest in the case using a standardized questionnaire that indentifies potential data sources and records the locations of both electronic and paper files. This will help you ensure that the collection is managed and documented consistently. During custodian interviews, ask for documentation regarding any specific terminology, code names or acronyms that pertain to the matter. This will help to locate potentially relevant documents and narrow the amount of ESI to be reviewed. Additionally, asking custodians whether they routinely passwordprotect documents, and requesting a list of passwords from those who do, will help avoid the extra time and money associated with password decryption during processing. (See the Sample Custodian Interview Form in this Topic Pack) Pitfall #9 Using External Servers Public encompasses a variety of subscription-based and free services including yahoo! mail, hotmail and gmail. As a medium, public is notoriously insecure, and plagued with a long list of risks, including eavesdropping, spoofing, viruses, phishing, malware and hacking. Additionally, organizations that permit use of public systems face an increased risk of industrial espionage and information theft. According to a 2009 study by the Ponemon Institute, the average cost of insider data breaches was $6.6 million. To protect sensitive client- and case-specific information, prohibit the use of public servers within your firm. Talk to your IT department or a trusted consultant about blocking web-based mail services, and be sure to create a personnel policy that address unacceptable use of the firm s network. In the 2010 Altep, Inc. All rights reserved. [ SE] www. altep.com Please contact Altep for permission to reprint or distribute this article. Page 4

20 event that you need to dismiss a staff member for inappropriate, unsafe or unscrupulous activities, you ll need solid documentation of both your firm s standards and the individual s behavior. Pitfall #10 Irregular Quality and Productivity Tracking Very often, the pace of a discovery project will prove unpredictable. A review project that starts out at a measured pace can rapidly turn into a hurtling race toward the deadline especially if unexpected custodians or data sources are identified late in the project. Unfortunately, in the rush to keep up with influx of review-ready material, quality control can easily fall by the wayside. Ironically, careful monitoring of both quality and productivity is even more critical in projects that evolve very quickly in its absence, budgets and timelines can easily reach their breaking point in a matter of days or weeks. Selecting a review platform with real-time quality control and productivity tracking can alleviate this pressure point, giving you the ability to quickly respond to project issues as they arise. Altep, Inc. is a leader and innovator in the fields of e-discovery and document management. For more information about best practices for discovery and review, or to discuss any of our service offerings, please contact us at or visit us online at Altep, Inc. All rights reserved. [ SE] www. altep.com Please contact Altep for permission to reprint or distribute this article. Page 5

21 Custodian Interview Form Privileged and Confidential Case Information: Case: Case Summary: Interviewer: Name: Location: Date: Time: Custodian: Name: Department: Title: Telephone: Predecessor: Name: Title: Location of Custodian s Digital Data: Office Computer Office Server Office Laptop Home Personal Computer External Hard Drive USB Flash Drive MP3 Storage Device External Optical Media External Magneto Media (Zip, Backup) Cellular Telephone PDA Device (Palm, IPAQ, BlackBerry) Other: Social Networks: ` Time in Service: Qty: Requested Date: Received Date: Location of Custodian s Hardcopy Data: Office Desk Office File Cabinet Office Storage Room Home Desk Home File Cabinet Briefcase/Attaché Other: Qty: Requested Date: Received Date: Developed and distributed by Altep, Inc

22 Archive(s) or Storage Room(s) of Digital Data and Physical Hard Copies: Location: Describe: Visual/Other Media: Location: Format: Units: Requested Date: Received Date: Case Acrynomns, Codewords, Terminology, Report(s) names, etc. related to the matter: 1) 2) 3) 4) 5) 6) 7) 8) 9) Have you identified yourself and / or participated in social networks related to the matter: Blog Blog Tweet Tweet Social Network: Social Network: Social Network: Site: Site: Name: Name: Site: Site: Site: Comments and Notes: Developed and distributed by Altep, Inc

for Insurance Claims Professionals

for Insurance Claims Professionals A Practical Guide to Understanding ediscovery for Insurance Claims Professionals ediscovery Defined and its Relationship to an Insurance Claim Simply put, ediscovery (or Electronic Discovery) refers to

More information

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery?

E-Discovery Basics For the RIM Professional. Learning Objectives 5/18/2015. What is Electronic Discovery? E-Discovery Basics For the RIM Professional By: Andy Sokol, CEDS, CSDS Adding A New Service Offering For Your Legal & Corporate Clients Learning Objectives What is Electronic Discovery? How Does E-Discovery

More information

Call or Visit us Today 800.263.0940 www.altep.com. sponsors 2007-2010

Call or Visit us Today 800.263.0940 www.altep.com. sponsors 2007-2010 Topic Pack: Forming a Lasting Strategic Partnership With Your E-Discovery Provider Call or Visit us Today 800.263.0940 www.altep.com sponsors 2007-2010 Consulting Forensics Paper Discovery Electronic Discovery

More information

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director

ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director ediscovery 101 Myth Busting October 29, 2009 Olivia Gerroll ediscovery Solutions Group Director Background Olivia Gerroll, ediscovery Solutions Group Director Over sixteen years of experience in litigation

More information

What You Should Know About ediscovery

What You Should Know About ediscovery KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the

More information

APPENDIX B TO REQUEST FOR PROPOSALS

APPENDIX B TO REQUEST FOR PROPOSALS Overview and Instructions APPENDIX B The service provider s responsibilities will include the following: (A) Processing of ESI produced to CTAG in a variety of file formats; (B) Hosting ESI produced to

More information

Best Practices in Electronic Record Retention

Best Practices in Electronic Record Retention I. Some Key Considerations In Whether To Engage An E-Discovery Vendor (Or Vendors) A. It is difficult to decide whether to retain a vendor if you don t know what your organization can do and at what cost.

More information

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare

102 ediscovery Shakedown: Lowering your Risk. Kindred Healthcare 102 ediscovery Shakedown: Lowering your Risk Long-Term Care Session HCCA Compliance Institute April 27, 2009 Las Vegas, Nevada Presented by: Diane Kissel, Manager IS Risk & Compliance Kindred Healthcare,

More information

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services EnCase Enterprise/ ediscovery Strategic Consulting EnCase customers now have a trusted expert advisor to meet their discovery goals. NightOwl Discovery offers complete support for the EnCase Enterprise

More information

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013 MDLA TTS August 23, 2013 ediscovery for DUMMIES LAWYERS Kate Burke Mortensen, Esq. kburke@xactdatadiscovery.com Scott Polus, Director of Forensic Services spolus@xactdatadiscovery.com 1 Where Do I Start??

More information

E- Discovery in Criminal Law

E- Discovery in Criminal Law E- Discovery in Criminal Law ! An e-discovery Solution for the Criminal Context Criminal lawyers often lack formal procedures to guide them through preservation, collection and analysis of electronically

More information

Digital Forensics, ediscovery and Electronic Evidence

Digital Forensics, ediscovery and Electronic Evidence Digital Forensics, ediscovery and Electronic Evidence By Digital Forensics What Is It? Forensics is the use of science and technology to investigate and establish facts in a court of law. Digital forensics

More information

IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION

IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION IMPORTANT CONSIDERATIONS FOR MID-RANGE EDISCOVERY DATA COLLECTION REUTERS / SUHAIB SALEM Written by Kyle Sparks White paper EXECUTIVE SUMMARY Data collection during ediscovery is critically important because

More information

Best Practices: Defensibly Collecting, Reviewing, and Producing Email

Best Practices: Defensibly Collecting, Reviewing, and Producing Email Best Practices: Defensibly Collecting, Reviewing, and Producing Email October 9, 2014 Karsten Weber Principal, Lexbe LC ediscovery Webinar Series Info & Future Takes Place Monthly Cover a Variety of Relevant

More information

E-Discovery in Michigan. Presented by Angela Boufford

E-Discovery in Michigan. Presented by Angela Boufford E-Discovery in Michigan ESI Presented by Angela Boufford DISCLAIMER: This is by no means a comprehensive examination of E-Discovery issues. You will not be an E-Discovery expert after this presentation.

More information

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove*

ESI DEMYSTIFIED. Streamlining the E-Discovery Process Through Internal Processes and Controls. Melinda Burrows Bruce Cosgrove* ESI DEMYSTIFIED Streamlining the E-Discovery Process Through Internal Processes and Controls Melinda Burrows Bruce Cosgrove* The widespread proliferation of electronically stored information (so-called

More information

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI

Making Sense of E-Discovery: 10 Plain Steps for Producing ESI Making Sense of E-Discovery: 10 Plain Steps for Producing ESI The following article provides a practical guide to producing electronically stored information (ESI) that lawyers can apply immediately in

More information

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS KYLE ALEXANDER, and DYLAN SYMINGTON, on behalf of themselves and all those

More information

Litigation Support. Learn How to Talk the Talk. solutions. Document management

Litigation Support. Learn How to Talk the Talk. solutions. Document management Document management solutions Litigation Support glossary of Terms Learn How to Talk the Talk Covering litigation support from A to Z. Designed to help you come up to speed quickly on key terms and concepts,

More information

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY 2016 CLM Annual Conference April 6-8, 2016 Orlando, FL Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY Understanding e-discovery definitions and concepts is critical to working with vendors,

More information

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products AccessData Corporation No More Load Files Integrating ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products White Paper August 2010 TABLE OF CONTENTS Introduction... 1 The

More information

Veritas ediscovery Platform

Veritas ediscovery Platform TM Veritas ediscovery Platform Overview The is the leading enterprise ediscovery solution that enables enterprises, governments, and law firms to manage legal, regulatory, and investigative matters using

More information

Electronic Discovery. Answers to life s enduring questions

Electronic Discovery. Answers to life s enduring questions Electronic Discovery Answers to life s enduring questions 1 Electronic Discovery 1. Requirements: What do courts expect? 2. Potential consequences of missteps? Sanctions and unnecessary expense 3. Solutions:

More information

Symantec ediscovery Platform, powered by Clearwell

Symantec ediscovery Platform, powered by Clearwell Symantec ediscovery Platform, powered by Clearwell Data Sheet: Archiving and ediscovery The brings transparency and control to the electronic discovery process. From collection to production, our workflow

More information

A Modern Approach for Corporations Facing the Demands of Litigation

A Modern Approach for Corporations Facing the Demands of Litigation A Modern Approach for Corporations Facing the Demands of Litigation The first pure Software-as-a-Service (SaaS) e-discovery technology designed to help in-house legal teams face the increased risk and

More information

Discovery in the Digital Age: e-discovery Technology Overview. Chuck Rothman, P.Eng Wortzman Nickle Professional Corp.

Discovery in the Digital Age: e-discovery Technology Overview. Chuck Rothman, P.Eng Wortzman Nickle Professional Corp. Discovery in the Digital Age: e-discovery Technology Overview Chuck Rothman, P.Eng Wortzman Nickle Professional Corp. The Ontario e-discovery Institute 2013 Contents 1 Technology Overview... 1 1.1 Introduction...

More information

Electronically Stored Information: Focus on Review and Strategies

Electronically Stored Information: Focus on Review and Strategies Procrastinators Programs SM Electronically Stored Information: Focus on Review and Strategies Gavin Manes, Ph.D., Avansic Course Number: 0200121220 1 Hour of CLE December 20, 2012 11:20 12:20 p.m. Gavin

More information

Discovery Data Management

Discovery Data Management Discovery Data Management in Practice Introductions Reveal Derick Roselli 949-280-3519 droselli@revealdata.com www.revealdata.com Program Outline Pre-Planning Stages Workflow Management Project Management

More information

Viewpoint ediscovery Services

Viewpoint ediscovery Services Xerox Legal Services Viewpoint ediscovery Platform Technical Brief Viewpoint ediscovery Services Viewpoint by Xerox delivers a flexible approach to ediscovery designed to help you manage your litigation,

More information

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally

More information

www.salixdata.com 513-381-2679

www.salixdata.com 513-381-2679 Electronic Discovery Presented by: Jonathan Adams www.salixdata.com 513-381-2679 Our Goal Explain E-Discovery in layman s terms Equip you to be able to add value to your organization SALIX is the region

More information

Technical Evidence Management Theory: The early application of technology to reduce dispute resolution costs

Technical Evidence Management Theory: The early application of technology to reduce dispute resolution costs Technical Evidence Management Theory: The early application of technology to reduce dispute resolution costs Today s topics 1. Technical Evidence Management Theory 2. Enterprise Archiving to Reduce Costs

More information

Introduction Thanks Survey of attendees Questions at the end

Introduction Thanks Survey of attendees Questions at the end Introduction Thanks Survey of attendees Questions at the end 1 Electronic records come in a variety of shapes and sizes and are stored in a multitude of ways. Just what are you managing? Video Cloud computing

More information

Electronic Discovery

Electronic Discovery Electronic Discovery e-discovery: A Primer Mauricio Perry, CRM, CEDS Mauricio Perry, CEDS, CRM 1 Disclaimer I am not a lawyer The ideas exposed here are not to be construed as legal advice but are educational

More information

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments

E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments E-discovery: Federal Rules of Civil Procedure and their Implications for Public Sector Corrections Departments Andres De Aguero, Senior Lead, Deloitte Consulting LLP David F. Axelrod, Director, Deloitte

More information

Are you ready for more efficient and effective ways to manage discovery?

Are you ready for more efficient and effective ways to manage discovery? LexisNexis Early Data Analyzer + LAW PreDiscovery + Concordance Software Are you ready for more efficient and effective ways to manage discovery? Did you know that all-in-one solutions often omit robust

More information

What Am I Looking At? Andy Kass

What Am I Looking At? Andy Kass Concordance Tip Sheet August 2013 What Am I Looking At? Andy Kass Discovery is the process of requesting, producing and gleaning documents to substantiate assertions of fact in a case. Review is a deep,

More information

It s All About the Deadline:

It s All About the Deadline: White Paper It s All About the Deadline: Overcoming the four key challenges of ediscovery to help control attorney review costs. Ken Reiff Vice President, Business Development Xerox Litigation Services

More information

The E-Discovery Process

The E-Discovery Process POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of

More information

Proactive Data Management for ediscovery

Proactive Data Management for ediscovery Proactive Data Management for ediscovery Simon Taylor Snr. Director Information Management CommVault Systems Inc. Why ediscovery sucks for IT The US Federal Rules of Civil Procedure Rule 34(a), (b) Definition

More information

This Webcast Will Begin Shortly

This Webcast Will Begin Shortly This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: accwebcast@commpartners.com Thank You! Welcome! Electronic Data

More information

Journal of Digital Forensic Practice

Journal of Digital Forensic Practice Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP

More information

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation

ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Brought to you by: ediscovery Policies: Planned Protection Saves More than Money Anticipating and Mitigating the Costs of Litigation Introduction: Rising costs of litigation The chance of your organization

More information

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and

More information

ARCHIVING FOR EXCHANGE 2013

ARCHIVING FOR EXCHANGE 2013 White Paper ARCHIVING FOR EXCHANGE 2013 A Comparison with EMC SourceOne Email Management Abstract Exchange 2013 is the latest release of Microsoft s flagship email application and as such promises to deliver

More information

For Your ediscovery... Software

For Your ediscovery... Software For Your ediscovery... Software is not enough Leading Provider of Investigatory and Litigation Support Services for Corporations, Government Agencies and Am Law Firms Worldwide Our People Make the Difference

More information

www.istdiscover-e.com

www.istdiscover-e.com www.istdiscover-e.com who is IST? IST ediscovery provides a full range of on-site litigation support and off-site ediscovery services that will take you from Early Case Assessment (ECA) through hosted

More information

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013 LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction

More information

PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS

PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS PROCEDURE 4040P Community Relations PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS Electronic Discovery Committee To help meet its obligations, the WSD uses an Electronic Discovery Committee, made up

More information

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION

GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION GUIDELINES FOR USE OF THE MODEL AGREEMENT REGARDING DISCOVERY OF ELECTRONICALLY STORED INFORMATION Experience increasingly demonstrates that discovery of electronically stored information ( ESI poses challenges

More information

ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS

ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS ediscovery Software Buyer s Guide FOR SMALL LAW FIRMS NE X TPOINT.C O M @NE X TPOINT Aided by the sensible use of technology, small firms should no longer be averse to taking on big cases or processing

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful

Only 1% of that data has preservation requirements Only 5% has regulatory requirements Only 34% is active and useful Page 1 LMG GROUP vs. THE BIG DATA TIDAL WAVE Recognizing that corporations, law firms and government entities are faced with tough questions in today s business climate, LMG Group LLC ( LMG Group ) has

More information

IBM ediscovery Identification and Collection

IBM ediscovery Identification and Collection IBM ediscovery Identification and Collection Turning unstructured data into relevant data for intelligent ediscovery Highlights Analyze data in-place with detailed data explorers to gain insight into data

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

The e-discovery edge: Expertise and preparation can save millions *

The e-discovery edge: Expertise and preparation can save millions * The e-discovery edge: Expertise and preparation can save millions * magine having to produce every e-mail you've sent or received in the past year, including ones you've deleted. Then add every spreadsheet

More information

REDUCING COSTS WITH ADVANCED REVIEW STRATEGIES - PRIORITIZATION FOR 100% REVIEW. Bill Tolson Sr. Product Marketing Manager Recommind Inc.

REDUCING COSTS WITH ADVANCED REVIEW STRATEGIES - PRIORITIZATION FOR 100% REVIEW. Bill Tolson Sr. Product Marketing Manager Recommind Inc. REDUCING COSTS WITH ADVANCED REVIEW STRATEGIES - Bill Tolson Sr. Product Marketing Manager Recommind Inc. Introduction... 3 Traditional Linear Review... 3 Advanced Review Strategies: A Typical Predictive

More information

AccessData Corporation

AccessData Corporation AccessData Corporation Using AccessData Lab to Perform Complete ediscovery Processing While Mitigating Risk: A Guide Providing Assurance and Protocol to Third-party EDD Providers White Paper Contents Introduction...

More information

In-House Solutions to the E-Discovery Conundrum

In-House Solutions to the E-Discovery Conundrum 125 In-House Solutions to the E-Discovery Conundrum Retta A. Miller Carl C. Butzer Jackson Walker L.L.P. April 21, 2007 www.pointmm.com I. OVERVIEW OF THE RULES GOVERNING ELECTRONICALLY- STORED INFORMATION

More information

Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings

Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings Considering Third Generation ediscovery? Two Approaches for Evaluating ediscovery Offerings Developed by Orange Legal Technologies, Providers of the OneO Discovery Platform. Considering Third Generation

More information

Stu Van Dusen Marketing Manager, Lexbe LC. September 18, 2014

Stu Van Dusen Marketing Manager, Lexbe LC. September 18, 2014 Best Practices: Litigation Document Management Applying The Latest Lexbe ediscovery Platform Features and Functionality for Fast and Collaborative Reviews and Productions September 18, 2014 Stu Van Dusen

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

E-mail Management: A Guide For Harvard Administrators

E-mail Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Ten practical steps for streamlining e-discovery from a lawyer s perspective

Ten practical steps for streamlining e-discovery from a lawyer s perspective 52 / 65 Chapter 10 Ten practical steps for streamlining e-discovery from a lawyer s perspective In Ireland, as in other common law jurisdictions, parties to civil legal disputes are required to formally

More information

Electronic Discovery and Disclosure:

Electronic Discovery and Disclosure: Electronic Discovery and Disclosure: Managing & Producing Electronic Information Washington State Office of the Attorney General 1 Overview of Presentation EDD (Electronic Discovery and Disclosure) ESI

More information

Understanding How Service Providers Charge for ediscovery Services

Understanding How Service Providers Charge for ediscovery Services ediscovery SERVICES Understanding How Service Providers Charge for ediscovery Services The objective of this document is to briefly define the prominent phases of the ediscovery lifecycle, the fees associated

More information

capabilities statement

capabilities statement capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional

More information

The ediscovery Balancing Act

The ediscovery Balancing Act WHITE PAPER: THE ediscovery BALANCING ACT The ediscovery Balancing Act Striking the Right Mix of In-House and Outsourced Expertise The ediscovery Balancing Act Contents Introduction...........................................

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

COST-EFFECTIVE SOLUTIONS TO MITIGATE RISK AND CONTROL LITIGATION COSTS

COST-EFFECTIVE SOLUTIONS TO MITIGATE RISK AND CONTROL LITIGATION COSTS Legal White Paper Series: The Real Costs & Risks of Email, Part2 COST-EFFECTIVE SOLUTIONS TO MITIGATE RISK AND CONTROL LITIGATION COSTS How in-house counsel can leverage Mid-Market Information Management

More information

Clearwell Legal ediscovery Solution

Clearwell Legal ediscovery Solution SOLUTION BRIEF: CLEARWELL LEGAL ediscovery SOLUTION Solution Brief Clearwell Legal ediscovery Solution The Challenge: Months Delay in Ascertaining Case Facts and Determining Case Strategy, High Cost of

More information

Litigation Solutions. insightful interactive culling. distributed ediscovery processing. powering digital review

Litigation Solutions. insightful interactive culling. distributed ediscovery processing. powering digital review Litigation Solutions insightful interactive culling distributed ediscovery processing powering digital review TECHNOLOGY ASSISTED REVIEW Eclipse combines advanced analytic technology with machine learning

More information

Document Storage Tips: Inside the Email Vault

Document Storage Tips: Inside the Email Vault Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Document Storage Tips: Inside the Email Vault Law360,

More information

DIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS

DIGITAL FORENSIC TECHNOLOGY SEE BEYOND THE NUMBERS DIGITAL FORENSIC TECHNOLOGY Key Terms and Definitions Forensic Technology e-discovery Computer Forensics Data Analysis / Data Mining FRCP - Revised Key Terms and Definitions Forensic Technology - The application

More information

Electronic documents questionnaire

Electronic documents questionnaire Electronic documents questionnaire (Civil Procedure Rules Practice Direction 31B) WARNING: Unless the court makes some other order, the answers given in this document may only be used for the purposes

More information

Guide to advanced ediscovery solutions

Guide to advanced ediscovery solutions RCLS Services & Technology Guide to advanced ediscovery solutions Océ Business Services Records, Compliance and Legal Solutions Products and Services Océ Business Services has earned the reputation as

More information

When E-Discovery Becomes Evidence

When E-Discovery Becomes Evidence Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal

More information

electronic discovery requests

electronic discovery requests Making and responding to electronic discovery requests By Martin Felsky and Peg Duncan One of the significant impacts of electronic discovery on litigation is the way in which it reconfigures the adversarial

More information

Digital Government Institute. Managing E-Discovery for Government: Integrating Teams and Technology

Digital Government Institute. Managing E-Discovery for Government: Integrating Teams and Technology Digital Government Institute Managing E-Discovery for Government: Integrating Teams and Technology Larry Creech Program Manager Information Catalog Program Corporate Information Security Information Technology

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.]

[DESCRIPTION OF CLAIM, INCLUDING RELEVANT ACTORS, EVENTS, DATES, LOCATIONS, PRODUCTS, ETC.] What follows isn t the perfect preservation letter for your case, so don t simply treat it as a form. Use it as a drafting aid that flags issues unique to EDD, but tailor your preservation demand to the

More information

From Chaos to Clarity.

From Chaos to Clarity. LITIGATION READINESS 3 PRESERVATION & COLLECTION 3 PROCESSING 3 DATA ANALYTICS 3 DOCUMENT REVIEW 3 PRODUCTION 3 POST PRODUCTION From Chaos to Clarity. The AlixPartners Difference Experienced. AlixPartners

More information

Portable. Harvester 4.0 has Arrived!! POWERFUL E-DISCOVERY COLLECTION SOFTWARE SEARCH AND COLLECT DISCOVERABLE DOCUMENTS AND EMAIL HARVESTER FEATURES

Portable. Harvester 4.0 has Arrived!! POWERFUL E-DISCOVERY COLLECTION SOFTWARE SEARCH AND COLLECT DISCOVERABLE DOCUMENTS AND EMAIL HARVESTER FEATURES Portable Defensible Automated E-Discovery Collection Harvester 4.0 has Arrived!! SEARCH AND COLLECT DISCOVERABLE DOCUMENTS AND EMAIL Incomplete and undocumented electronic discovery collections occur every

More information

Sample Electronic Discovery Request for Proposal

Sample Electronic Discovery Request for Proposal [COMPANY LOGO] Sample Electronic Discovery Request for Proposal Table of Contents OVERVIEW... 3 IMPORTANT CONSIDERATIONS FOR VENDOR SELECTION... 3 SECTION A: COMPANY PROFILE... 4 SECTION B: SCHEDULE &

More information

FEDERAL PRACTICE. In some jurisdictions, understanding the December 1, 2006 Amendments to the Federal Rules of Civil Procedure is only the first step.

FEDERAL PRACTICE. In some jurisdictions, understanding the December 1, 2006 Amendments to the Federal Rules of Civil Procedure is only the first step. A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! VOL. 7, NO. 11 232-235 REPORT NOVEMBER 1, 2007 Reproduced with permission from Digital Discovery & e-evidence, Vol. 7, No. 11, 11/01/2007, pp. 232-235. Copyright

More information

Metadata, Electronic File Management and File Destruction

Metadata, Electronic File Management and File Destruction Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information

More information

The Summation Users Guide to Digital WarRoom It s time for a fresh approach to e-discovery.

The Summation Users Guide to Digital WarRoom It s time for a fresh approach to e-discovery. The Summation Users Guide to Digital WarRoom It s time for a fresh approach to e-discovery. Legions of law firms and legal service professionals have been well served by industry s original software programs

More information

Email Encryption User Guide

Email Encryption User Guide Email Encryption User Guide August, 2013 Adapted from: Cisco Registered Envelope Recipient Guide Cisco Systems, Inc. TABLE of CONTENTS Section 1: Overview of Email Encryption... 3 Page Section 2: Overview

More information

So the security measures you put in place should seek to ensure that:

So the security measures you put in place should seek to ensure that: Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.

More information

A Radicati Group Webconference

A Radicati Group Webconference The Radicati Group, Inc. www.radicati.com A Radicati Group Webconference 9:30 am, PT November 3, 2011 The Radicati Group, Inc. Copyright November 2011, Reproduction Prohibited The Radicati Group, Inc.

More information

Procedure: Electronic Discovery

Procedure: Electronic Discovery Management System: Office of Chief Counsel Subject Area: Support and Information Access Procedure: Electronic Discovery Issue Date and Revision Number: 1/6/15 0 Lead Subject Matter Expert: Jay Jalovec

More information

Industry Leading Solutions: Innovative Technology. Quality Results.

Industry Leading Solutions: Innovative Technology. Quality Results. Industry Leading Solutions: Innovative Technology. Quality Results. April 10, 2013 emagsolutions.com Agenda Speaker Introduction A Quick Word about emag Importance of Technology Assisted Review (TAR) Key

More information

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES

LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES LEGAL HOLD OBLIGATIONS FOR DISTRICT EMPLOYEES INSERT YOUR NAME HERE Place logo or logotype here, Otherwise delete this text box. AGENDA.. Federal Rules of Civil Procedure What is a legal hold? What are

More information

KPMG Forensic Technology Services

KPMG Forensic Technology Services KPMG Forensic Technology Services Managing Costs in e-discoverye October 14, 2010 1 Agenda: Strategies to Manage Costs in e-discovery Pre-collection Strategies Filtering Strategies Review and Production

More information

E-Discovery Toolkit for Educational Institutions

E-Discovery Toolkit for Educational Institutions E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The

More information

2,000,000 files on 240 computers in 3 countries. By Monday. How?*

2,000,000 files on 240 computers in 3 countries. By Monday. How?* e-discovery Services 2,000,000 files on 240 computers in 3 countries. By Monday. How?* *connectedthinking With dedicated forensic labs in Zurich and Lausanne, our Swiss team of skilled professionals have

More information

The Business Case for ECA

The Business Case for ECA ! AccessData Group The Business Case for ECA White Paper TABLE OF CONTENTS Introduction... 1 What is ECA?... 1 ECA as a Process... 2 ECA as a Software Process... 2 AccessData ECA... 3 What Does This Mean

More information