KT LitSmart

  • Forensic Exam of a Mobile Device
    Legal Updates

    When a Forensic Exam of a Mobile Device May Be Warranted

    While requests for email communications and collections from hard drives and networks are standard in today’s litigation, a party’s text messages, and collections from mobile devices are oftentimes overlooked. A narrowly tailored motion to compel forensic exam can be a valuable discovery tool to analyze the data on a party’s mobile phone. This blog analyzes the factors that led a court in the Northern District of Illinois to order the forensic imaging and collection of a party's mobile phone.

  • Truth
    Legal Updates

    And The Truth, or Lack Thereof, Shall Set You Free - PART TWO

    In Part Two of this blog series, I discuss lessons learned and provide best practices for complying with discovery obligations. In Part One of this blog series, we analyzed Burris v. JP Morgan Chase & Co., et al., a case in which the Court dismissed Plaintiff's complaint with prejudice because of Plaintiff’s “extensive misconduct and deception, without any obvious contrition or awareness of the wrongfulness of his conduct” which posed a serious risk any further proceedings would be “plagued” by a similar pattern of discovery abuse and deception that would make “it impossible for the district court to conduct a trial with any reasonable assurance that the truth would be available." As litigants and legal practitioners, we can learn from the Court's decision in Burris and ensure we don't make the same mistakes.

  • Data Mapping
    Technology Advantage

    Data Mapping - Why is it Important for Successful E-Discovery?

    A data map is usually something that is generated along with a data retention plan and is a great starting point if and when an organization becomes involved in litigation and discovery. Long before litigation and discovery, however, it is important to understand the relevant data sources that may be in play and where those can be found within the organization’s various data systems. This blog explains what a data map is, what it contains and how it is helpful.

  • Maze
    Technology Advantage

    Pitfalls of Complex Search Protocols in ESI Agreements

    ESI Agreements cover the full gambit of e-discovery issues, from preservation expectations to production specifications. Sometimes, these agreements include an overview of the process by which the parties will identify the universe of potentially responsive documents by using specific date ranges, identifying priority custodians and developing proposed search terms. Adding another layer of complexity, this discussion is often had in a vacuum before the parties even know how much data their clients have. Coming up with criteria that identifies the relevant documents, but is not overly broad, in this vacuum can be difficult. However, the process is important because the date range, custodians and terms will inevitably dictate how much data is collected, processed and reviewed, which can significantly affect any litigation budget.

  • Truth
    Legal Updates

    And The Truth, or Lack Thereof, Shall Set You Free - PART ONE

    In Part One of this blog series, I discuss a case that makes clear the importance of complying with discovery obligations. The Court concluded that Plaintiff’s “extensive misconduct and deception, without any obvious contrition or awareness of the wrongfulness of his conduct” posed a serious risk any further proceedings would be “plagued” by a similar pattern of discovery abuse and deception that would make “it impossible for the district court to conduct a trial with any reasonable assurance that the truth would be available” and ordered Plaintiff’s complaint dismissed with prejudice. Indeed, although the old adage dictates that to the victor go the spoils, there are no spoils and no victory for one who engages in spoliation. 

  • Courthouse
    Legal Updates

    WARNING: Follow Your ESI Protocol Because the Court Will – PART ONE

    A lawsuit has been filed. Both parties have met and negotiated an ESI Protocol that has been formalized as a court order. Your review team has started the initial review and notices there are numerous duplicates. When this is brought to your attention, you discuss with your litigation support team and they suggest de-duplication and email threading as options. Which of the following would steps would be appropriate? In this blog, we'll dive into the next steps in this scenario and the importance of having an ESI Protocol in place.