E-Discovery. Solved.

LitSmart® E-Discovery is your partner in high stakes e-discovery matters. Our collaborative team of attorneys, paralegals, project managers and data analysts is dedicated to providing personalized solutions to your e-discovery, information governance and privacy needs throughout the world with a focus on security, defensibility, efficiency and controlling costs.

See Our Comprehensive Approach
See Our Comprehensive Approach

LitSmart E-Discovery

Don’t just litigate. LitSmart®! See how our award-winning team at LitSmart® leverages decades of experience in complex litigation, e-discovery and project management with best of breed technology in-house to provide comprehensive solutions that are superior to technology vendors or traditional law firms. Our team is the choice for savvy, streamlined and smart e-discovery.

  • Lawyer handing a privileged document to another lawyer
    Legal Updates

    Taming the Privilege Log Beast

    There are few things more dreaded in discovery than the time-consuming, tedious, onerous, beastly privilege log – especially in complex litigation matters involving thousands of pages of documents. These logs, however, are a critical component of the E-Discovery process that requires careful attention to detail in planning, analysis, and preparation. In this blog post, we will explain what a privilege log is, discuss the various types of privilege logs, recommend pre-privilege review strategies, and address post-submission concerns.

  • Attorney using a laptop computer to review privileged documents.
    Legal Updates

    THE ATTORNEY CLIENT PRIVILEGE: THE CORPORATE COMMUNICATION CONUNDRUM – PART II

    As anyone faced with discovery requests knows, one of the most important parts of producing documents is determining what documents are subject to attorney-client privilege or work product doctrine and must therefore be redacted or withheld. Failing to conduct an effective privilege review can have dire consequences -- from exposure of highly confidential information to even waiver of the privilege. In Part One of this blog post, we discussed how difficult it can be in a corporate context to determine whether an individual document should be withheld or redacted as privileged.  In this Part Two, we discuss how employing technology in our privilege review reduces risk and makes this process easier and more efficient.

  • Legal Updates

    The E-Discovery Problem of “Modern” Attachments: Case Trends in the Production of Hyperlinked Documents

    Have you ever given much thought to what constitutes a “family” of documents when producing electronically stored information (“ESI”)?  Even if you are an E-discovery attorney, you very well may not have. After all, it is pretty straight forward, isn’t it?  An email and all its attachments are a document family. Sometimes, you have a document with embedded files or images that may be split off into separate documents in the collection or processing process. That document and its embedded files are a document family. And . . . that’s pretty much it, right?  Well, not so fast. As cloud storage and collaboratively shared documents become more popular, we are seeing increasing numbers of emails that have hyperlinks to documents rather than conventional attachments.  So, are hyperlinked documents part of a family?  How are the courts handling these issues?