E-Discovery Best Practices

  • The Modern Attachment
    Legal Updates

    The Modern Attachment: How to Handle Hyperlinked Documents in Emails

    Document management systems allow users to send a link to a document directly from the system, ensuring that all recipients receive the same, most up to date version, and, often most importantly when it comes to efficiency, ensuring that only one person is working in a draft document at a time. When we email links to these documents, the document itself is not attached to the email; rather, a hyperlink to the document where it is housed on the document management system is attached. As an e-discovery professional, my next thought is….how do we handle these links in discovery? At least one court has grappled with this question and its decision sheds new light on how we can handle hyperlinked attachments in our own cases.

  • Privacy
    Legal Updates

    E-Discovery Strategies For Handling Personal Identifying Information

    We’re all familiar with the importance of avoiding the inadvertent disclosure of attorney-client communications, work product or sensitive, proprietary or confidential business information. However, our obligations don’t end there. In addition to protecting this information, we also need to consider how to handle personal identifying information (“PII”). With extremely large amounts of data being at play in most litigation matters, it is becoming more and more important to have a solid game plan with safeguards and protections in place. Accidentally disclosing PII can lead to a chaotic discovery process and could lead to expensive monetary sanctions.

  • Maze
    Technology Advantage

    Pitfalls of Complex Search Protocols in ESI Agreements

    ESI Agreements cover the full gambit of e-discovery issues, from preservation expectations to production specifications. Sometimes, these agreements include an overview of the process by which the parties will identify the universe of potentially responsive documents by using specific date ranges, identifying priority custodians and developing proposed search terms. Adding another layer of complexity, this discussion is often had in a vacuum before the parties even know how much data their clients have. Coming up with criteria that identifies the relevant documents, but is not overly broad, in this vacuum can be difficult. However, the process is important because the date range, custodians and terms will inevitably dictate how much data is collected, processed and reviewed, which can significantly affect any litigation budget.

  • Truth
    Legal Updates

    And The Truth, or Lack Thereof, Shall Set You Free - PART ONE

    In Part One of this blog series, I discuss a case that makes clear the importance of complying with discovery obligations. The Court concluded that Plaintiff’s “extensive misconduct and deception, without any obvious contrition or awareness of the wrongfulness of his conduct” posed a serious risk any further proceedings would be “plagued” by a similar pattern of discovery abuse and deception that would make “it impossible for the district court to conduct a trial with any reasonable assurance that the truth would be available” and ordered Plaintiff’s complaint dismissed with prejudice. Indeed, although the old adage dictates that to the victor go the spoils, there are no spoils and no victory for one who engages in spoliation. 

  • Courthouse
    Legal Updates

    WARNING: Follow Your ESI Protocol Because the Court Will – PART ONE

    A lawsuit has been filed. Both parties have met and negotiated an ESI Protocol that has been formalized as a court order. Your review team has started the initial review and notices there are numerous duplicates. When this is brought to your attention, you discuss with your litigation support team and they suggest de-duplication and email threading as options. Which of the following would steps would be appropriate? In this blog, we'll dive into the next steps in this scenario and the importance of having an ESI Protocol in place.

  • Name Tag
    Technology Advantage

    Insight into Name Normalization: What Is Your Name?

    Assigning a single unique name to identify an individual has created problems that precede the inception of e-discovery. Think of Santa Claus, St. Nicholas, St. Nick, Noel or simply Santa. These variations are associated with a unique individual and yet, our society has been using different names to refer to him since before we were born. In e-discovery, identifying individuals with information relevant to a dispute is one of the first and most important steps we go through at the inception of a case. As such, the identification of the different names for these individuals is critical to ensuring we do not miss potentially relevant files.