X

Josh Markarian

Top 10 Social Media Platforms Ranked by Monthly Annual Users

At first glance social media may not seem it, but it is a major player in eDiscovery. From Facebook to…

What Is FTP And Why Is It Secure?

File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially…

Common E-Discovery Terms & Definitions Part 2

Electronic Discovery is an industry where both technological competence and legal literacy are major players. The EDRM model is at…

Common E-Discovery Terms & Definitions Part 1

Learning how to navigate the waters of eDiscovery can be difficult, especially when so many common industry terms can sound…

eDiscovery Considerations in Relation to Blockchain & BTC

What is Cryptocurrency Cryptocurrency is a digital form of currency that exists outside of centralized authority which is also known…

What Legal Professionals Need to Know About the Importance of SOC 2 Compliance

Understanding security compliance can be especially important for legal firms that represent banks, defense contractors and other financial institutions that…

E-Discovery Preparation and Permanence for Document Review

Document review has become a major profit service for law firms. This gives an inlet to new technologies that allow…

Summary of eDiscovery Rule 37(e): Failure to Preserve Electronically Stored Information (Safe Harbor)

FRCP Rule 37. Failure to Make Disclosures or Cooperate in Discovery: Sanctions (e) Failure to Preserve Electronically Stored Information. (f)…

TERIS eDiscovery Project Process: The 10 Key Steps

TERIS tightly manages an eDiscovery engagement by applying these 10 key industry-wide process steps, which help minimize the risks and…

Digital Forensics – Stage 2: Electronic Discovery Processing & Analysis

Once the data has been identified through appropriate data mapping techniques, and defensibly collected by a certified forensic examiner the…