Blog Posts

Machine Learning & E-Discovery

Machine learning is a type of artificial intelligence which evolved from the study of pattern recognition. Through the construction of algorithms, machines can make predictions on data versus following preprogrammed commands. What’s more, these algorithms can make independent decisions when new data is applied. As computer processing power improves, this technology can be applied to…

Read More

5 Reasons Why Businesses Need A Business Email Archive Policy

It’s virtually impossible these days to conduct business without emails flying like crazy. From exchanging quick communications to sending projects and even legal documentation, email is a quick and easy solution for collaborating across the miles… or even to the next cubicle over. It seems odd, then, that there are still companies who fail to…

Read More

Why Your Firm Needs a Mobile Device Policy

The convenience and functionality of mobile phones, tablets, and laptops enable our content hungry lives. Each year, we become more dependent on constant use of mobile devices to keep up with our professional and personal lives.  Mobile technology is so ingrained in our daily life, we use it to shop, email, search the web, navigate,…

Read More

6 eDiscovery Tips to Reduce Costs and Improve Efficiency

  ESI Rule Number One: “… to secure the just, speedy, and inexpensive determination of every action and proceeding.” FED. R. OF CIV. P.1. When outside counsel understands ESI they will meet the above-mentioned rule and ethically represent their clients.” Improperly worded requests for ESI Collection from counsel may not only cost a firm time…

Read More

How to Minimize eDiscovery Wounds When Racing The Clock

As the business of litigation becomes more data driven, it exposes even minor mistakes during the “eDiscovery” process. The most common self-inflicted wounds often occur before substantive discovery even starts; the legal hold. A legal hold is the process undertaken to preserve all forms of relevant information for anticipated litigation. Legal holds are not “one…

Read More

A Look Back at Native Files in eDiscovery

Legal discovery review has come a long way in the last decade to find solutions around the growing volume of ESI. While we wait for the next generation of computer assisted review to fully arrive, let’s revisit human review of native files. Reviewing native files is more defensible and efficient during the review process as…

Read More

Chain of Custody: The Basics

A Chain of Custody (CoC) is a legal document that represents one client original media; a phone, a computer, a hard drive, etc. The CoC shows who has been in possession or custody of the electronic storage device absence its possession with the custodian, the original owner of the device. In other words, if you…

Read More

4 Basic eDiscovery Search Habits to Break

  1) Improper deduping practices When working with data filters within your eDiscovery search strategy, make sure that you only deduplicate your results AFTER running your keyword search. Failure to do this risks inadvertently excluding and missing items that fit your date range but were deduped against earlier copies of the same items outside of…

Read More

TERIS eDiscovery Project Process: The 10 Key Steps

TERIS tightly manages an eDiscovery engagement by applying these 10 key industry-wide process steps, which help minimize the risks and exposure, while balancing the costs involved: Understand the Electronically Stored Information (ESI) Documents – Part of our job as good consultants on a case, is to invest significant resources to help the case team understand the…

Read More