Top eDiscovery Certifications, Courses, Education & More

on Mon, Jun 29, 2020 By | Jeremy Greer | 0 Comments | Best Practices
Digital WarRoom supports a range of eDiscovery educational initiatives. Several organizations offer a range of services from eDiscovery training, to eDiscovery courses, networking and resources. We believe in Just, Speedy and Inexpensive eDiscovery. Many of the resources and initiatives we support are important catalysts in making eDiscovery accessible for all sized firms and all sized cases. These orgs are great opportunities to break into an eDiscovery career, advance a professional resume and gain knowledge from established eDiscovery veterans. I’ll also recommend a range of eDiscovery blogs, eDiscovery podcasts and eDiscovery books to stay up to date on trends and thought leadership.
Read More

How to Protect Against Ransomware Attacks

on Mon, Jun 22, 2020 By | Bill Gallivan | 0 Comments | Best Practices
Cybercrime continues to cast a large shadow across the legal community, especially when it comes to ransomware. Within a single 24-hour period alone, three law firms were targets of such cybercriminal exploits, resulting in stolen data and the potential for sensitive information to be posted in public forums.
Read More

Email Discovery - How To Preserve, Collect, & Review

on Mon, Jun 08, 2020 By | Jeremy Greer | 0 Comments | Best Practices
Email is one of the most commonly collected forms of electronically stored information in legal matters. When a person or company is subpoenaed, the requesting party will most likely ask for all or a subset of the email box of each potentially relevant custodian. The search, interview, and legal hold process may be time-consuming, but just know that a good amount of the relevant data you are looking for more often than not is in email format. Both the producing party and the custodians themselves can use export functionality within their email application of choice to collect and deliver the email files in question. This pre-existing functionality should make it easier for lawyers to instruct custodians on proper preservation and collection practices.
Read More

Notes On Matter Migration To Digital WarRoom

on Mon, Apr 27, 2020 By | Dan Gallivan | 0 Comments | Best Practices
Whether you are in the process of switching vendors or simply deciding how to best cooperate with the opposing party on asking for a production format that works in your system, there are several things to keep in mind.
Read More

How Many Pages In A Gigabyte? A Litigator's Guide

on Thu, Apr 02, 2020 By | Paulette Keheley | 0 Comments | Best Practices
Litigators and eDiscovery consultants alike have debated for years the best methods to create litigation budgets. Assuming that most cases settle, eDiscovery can account for a significant portion of the costs, so that is often the best place to start. eDiscovery fees can vary significantly between vendors, and you will need to consider the possibility of flat fees, per-gb hosting fees, per-gb processing fees, user fees, service fees, and more.
Read More

eDiscovery PDF Productions – Bigger Is Not Better

on Wed, Mar 25, 2020 By | Alison ONeill | 0 Comments | Best Practices
A recent Federal Court decision is making a big statement about big e-Discovery. In May of 2019 the case Abbott Laboratories et al. v. Adelphia Supply USA (E.D.N.Y), United States Magistrate Judge Lois Bloom pointed to the production of information in one large PDF as a factor in her decision to recommend sanctions be granted and a default judgment be entered against the producing party.
Read More

8 Crucial Tips To Improve Your Privilege Log Workflow

on Tue, Mar 03, 2020 By | Robert Powell | 0 Comments | Best Practices
Most attorneys representing businesses in litigation have experienced the excruciating burden of reviewing ESI - e-mails and electronically stored information - for privilege or work-product protection, and then having to create a privilege log, a laborious manual effort to build a list describing each document withheld for reasons of privilege. Counsel agonizes over the communications involving the client’s counsel and then the adequacy of the description of the withheld documents in the privilege log.
Read More

Email Threading in eDiscovery: The Longest Thread Policy

on Mon, Dec 16, 2019 By | Jeremy Greer | 0 Comments | Best Practices
What Are Email Threads? Email threads represent a group of emails all originating from the same email. These email thread groupings are convenient constructs for which eDiscovery tools and reviewers can logically define a conversation. For the purpose of understanding email threads, think of these conversations as branches. Emails will often branch off in many directions as senders cc, bcc or forward the email to different recipients.  
Read More

5 Steps To Create A Stellar eDiscovery Document Production

on Mon, Oct 14, 2019 By | Jeremy Greer | 2 Comments | Best Practices
Step 1: Understand Your Obligations and Requirements In litigation, the party to which a document production request is directed must disclose all documents and ESI relevant to a legal investigation with the exception that documents can be withheld due to privilege. Rule 34a of the Federal Rules of Civil Prodecure (FRCP) states that a party may serve on any other party a request [to produce documents and esi] so long as that request isn’t unduly burdensome according to Rule 26b.
Read More

How To Sleuth Your Way To An Accurate eDiscovery Data Map

on Mon, Aug 05, 2019 By | Jeremy Greer | 0 Comments | Best Practices
A data map is a structured analysis of the target company's sources of data which could be potentially relevant to a legal investigation. During an eDiscovery project, the identification stage is about gaining a complete understanding of this data map and how it relates to the organizational (org) chart. Some companies will have a data map, an org chart and specific data retention policies already prepared and in place. These practices can vary between companies and even between departments. When litigation becomes imminent, you may be in a rush to send out a legal hold to prevent intentional or unintended destruction of data. Your eDiscovery workflow may follow a specific, defined order, or more commonly your discovery plan may allow you to come back for second and third rounds of data identification. It is a best practice to put together an accurate data map and continue to revisit it, thereby adding and removing data sources as you gain a more thorough understanding of the data and formally define the scope of the investigation.
Read More

Recent Blogs

Featured Blogs

Product Updates

Subscribe To Monthly Blog Distribution List

Checklist-Manifesto-Banner
The content on this blog is not intended to be legal advice.

Subscribe To Monthly Blog Distribution List