Posts Tagged ‘E-Discovery’
E-Discovery Processing Workflows Explained – What is De-NISTing?
De-NISTing is the standard eDiscovery practice of removing system files, and other non-user generated ESI from a dataset during the data processing stage. NIST refers to the acronym of National Institute of Standards and Technology.
Read MoreInteresting IoT Statistics and How it Applies to E-Discovery
Our daily lives are constantly evolving, and the Internet of Things (IoT) plays a massive role in that. Devices that were once standalone products such as the thermostat, vehicle sensors, medical implants, alarm systems, and garage doors can now all be networked to the internet. So, what exactly is the IoT?
Read More6 E-Discovery Predictions For 2018
Extract of article by Erich Potter of Law360.com With new rules and evolving technology, it is an interesting time for e-discovery. Practitioners are faced with the unique challenge of implementing these new rules and technologies while also controlling costs in the face of exploding data volumes for nearly every case. Today, the latest technologies and…
Read More20 eDiscovery Blogs for Legal Professionals to Follow (Updated)
20 eDiscovery Blogs for Legal Professionals to Follow (Updated) The complexities of eDiscovery make constantly following recent eDiscovery news and developments a necessity for most legal professionals. EDiscov ery is a part of all forms of litigation and continues to grow and evolve at an astounding rate. Fortunately, there are a number of blogs that…
Read MoreThe Evolution of eDiscovery – Part 2
Fortunately, the evolution of the eDiscovery process itself has generated solutions in the form of: enriched technological innovation improving and refining identification and collection of case-related data, assessing data and sorting it by relevance, and for integration into litigation strategy. Applying the eDiscovery Method eDiscovery is by now an essential component of most business and…
Read MoreThe Evolution of eDiscovery – Part 1
Recent court rulings have found that electronically stored information (ESI) has equal evidentiary weight and value as conventional paper documents. With eDiscovery, the methods traditionally used for legal discovery are applied to digitally warehoused materials and electronic documents. The exceptional range of digital information subject to eDiscovery includes emails, Word/PDF and other documents, YouTube videos/digital…
Read MoreFour Steps to Maximizing Your Outsourced eDiscovery Dollar – Part 2
For both in-house counsel and outside counsel, external litigation support vendors can act as an extension of their own legal department, creating extra value and a competitive edge for clients. Here are the major areas where an eDiscovery provider must show they are up to par: Alternative Fee Arrangements Alternative Fee Arrangements (AFAs) are now…
Read MoreFour Steps to Maximizing Your Outsourced eDiscovery Dollar – Part 1
For both in-house counsel and outside counsel, external litigation support vendors can act as an extension of their own legal department, creating extra value and a competitive edge for clients. Much has been made of the argument as to whether to outsource eDiscovery (see Ralph Losey’s excellent article “Five Reasons to Outsource Litigation Support”, Law…
Read MoreExpert eDiscovery Development Consultant Joins TERIS a National Leader in eDiscovery, Information Governance, Computer Forensics and Relativity
TERIS a leading provider of eDiscovery Solutions and Information Governance Consulting to corporations and law firms across the US, announced the addition of Jennifer Hudson as an eDiscovery Development Consultant in the Houston, Texas office. Austin, Texas (PRWEB) May 31, 2014 John Hartman, Principal/TERIS, recently announced that Jennifer Hudson joined TERIS as an eDiscovery Development Consultant. According…
Read MoreeDiscovery Processes – Part 3
Electronic Discovery for Legal Evidence eDiscovery has validity because almost all examples of EFD are recorded permanently by digital sources and can be accessed if necessary as legal evidence. To this extent it is true that absolute privacy in communications — personal, enterprise, social, governmental, etc. — no longer really exists, and can become…
Read More