X

Blog Posts

5 Reasons Why Businesses Need A Business Email Archive Policy

It’s virtually impossible these days to conduct business without emails flying like crazy. From exchanging quick communications to sending projects…

5 Common Yet Avoidable HIPAA Violations

6 eDiscovery Tips to Reduce Costs and Improve Efficiency

  ESI Rule Number One: “… to secure the just, speedy, and inexpensive determination of every action and proceeding.” FED.…

How to Minimize eDiscovery Wounds When Racing The Clock

As the business of litigation becomes more data driven, it exposes even minor mistakes during the “eDiscovery” process. The most…

A Look Back at Native Files in eDiscovery

Legal discovery review has come a long way in the last decade to find solutions around the growing volume of…

Chain of Custody: The Basics

A Chain of Custody (CoC) is a legal document that represents one client original media; a phone, a computer, a…

4 Basic eDiscovery Search Habits to Break

  1) Improper deduping practices When working with data filters within your eDiscovery search strategy, make sure that you only…

TERIS eDiscovery Project Process: The 10 Key Steps

TERIS tightly manages an eDiscovery engagement by applying these 10 key industry-wide process steps, which help minimize the risks and…

Wearable Technology eDiscovery Considerations

What exactly is wearable tech? Wearable technology encompasses accessories that can be worn by a consumer and is meant to…

Government Investigations in E-Discovery

One of the biggest fears an organization faces is a government issued subpoena. This is NOT the point at which…