It’s virtually impossible these days to conduct business without emails flying like crazy. From exchanging quick communications to sending projects and even legal documentation, email is a quick and easy solution for collaborating across the miles… or even to the next cubicle over. It seems odd, then, that there are still companies who fail to…
ESI Rule Number One: “… to secure the just, speedy, and inexpensive determination of every action and proceeding.” FED. R. OF CIV. P.1. When outside counsel understands ESI they will meet the above-mentioned rule and ethically represent their clients.” Improperly worded requests for ESI Collection from counsel may not only cost a firm time…
As the business of litigation becomes more data driven, it exposes even minor mistakes during the “eDiscovery” process. The most common self-inflicted wounds often occur before substantive discovery even starts; the legal hold. A legal hold is the process undertaken to preserve all forms of relevant information for anticipated litigation. Legal holds are not “one…
Legal discovery review has come a long way in the last decade to find solutions around the growing volume of ESI. While we wait for the next generation of computer assisted review to fully arrive, let’s revisit human review of native files. Reviewing native files is more defensible and efficient during the review process as…
A Chain of Custody (CoC) is a legal document that represents one client original media; a phone, a computer, a hard drive, etc. The CoC shows who has been in possession or custody of the electronic storage device absence its possession with the custodian, the original owner of the device. In other words, if you…
1) Improper deduping practices When working with data filters within your eDiscovery search strategy, make sure that you only deduplicate your results AFTER running your keyword search. Failure to do this risks inadvertently excluding and missing items that fit your date range but were deduped against earlier copies of the same items outside of…
TERIS tightly manages an eDiscovery engagement by applying these 10 key industry-wide process steps, which help minimize the risks and exposure, while balancing the costs involved: Understand the Electronically Stored Information (ESI) Documents – Part of our job as good consultants on a case, is to invest significant resources to help the case team understand the…
What exactly is wearable tech? Wearable technology encompasses accessories that can be worn by a consumer and is meant to aid with everyday life. Wearable tech can be as simple as a Fitbit that tracks your steps towards a fitness goal or as complex as Google Glass removing the need to use our hands in…
One of the biggest fears an organization faces is a government issued subpoena. This is NOT the point at which you should begin data collection as it is both costly and time consuming, because unlike traditional litigation there is no negotiation in the scope of discovery and prevention. At this point you have to consult…
Client Log-In
Call us at
888.99.TERIS
Disclosures