Posts Tagged ‘esi’
Summary of eDiscovery Rule 37(e): Failure to Preserve Electronically Stored Information (Safe Harbor)
FRCP Rule 37. Failure to Make Disclosures or Cooperate in Discovery: Sanctions (e) Failure to Preserve Electronically Stored Information. (f) Failure to Participate in Framing a Discovery Plan Essentially, Federal Rule 37(e) governs the requirement for competent preservation of discoverable information and ESI that may be related to the matter. Rule 37(f) addresses the need…
Read MoreTERIS eDiscovery Project Process: The 10 Key Steps
TERIS tightly manages an eDiscovery engagement by applying these 10 key industry-wide process steps, which help minimize the risks and exposure, while balancing the costs involved:
Read MoreRecent Florida Case Ruling Warns of Dangers with Self-Collection During Discovery
Rule 26(g) Signing of Discovery Requests, Responses, and Objections is the requirement of engagement in discovery in a defensible and responsible way. The rule was created to limit abuse in discovery through the use of sanctions. Discovery is an essential part of the legal process and as a result a party should be given the opportunity to properly prepare and develop their case. Rule 26(g) is brought in when there is a range of issues originating from the handling of ESI and proper collection of data most commonly when there is evidence of spoliation, failure to produce, lack of due diligence, and in this case self-collection.
Read More10 eDiscovery, Forensics & ESI Podcasts to Subscribe to in 2020
From data migrations to emerging technologies, here are some of the best podcasts (in no particular order) to subscribe to on the topics of eDiscovery, forensics, big data and more. Open up your favorite podcast app and dive into the best legal industry topics available online.
Read MoreAssess Risk After a Breach – Including Security Breach Notification Laws By State
A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted environment. Data breaches can come in a plethora of forms, most commonly: ransomware, malware, phishing, denial of service & physical theft.
Read MoreCalifornia Consumer Privacy Act (CCPA) Overview
The California Consumer Privacy Act (CCPA) gives customers extensive new rights protecting their personal information. Under the new regulations business will need to publicly disclose their data sharing and privacy practices and give them the option to have their data cleared. One goal of this is to clear away unsolicited marketing and allow consumers the…
Read MoreControlling Your Data: Optical Character Recognition (OCR)
Optical Character Recognition (OCR) is technology that aids in converting paper based documents, images and large volume repositories into electronically searchable and archival data. OCR can work with both hard copy data and digital information helping reviewers and teams boost visibility and control over their data.
Read MoreLeveraging a Searchable Discovery Repository for Serial Custodians
Eliminate redundant data processing and document review with a searchable data repository that can be repurposed across multiple ediscovery projects. When dealing with ongoing matters, serial custodians and repeat clients whose data is relevant across multiple cases utilizing a searchable esi data repository can cut the time, cost and mitigate risk with a defensible process.…
Read MoreTips for Data Handoffs & Maintaining ESI Protocol
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle
Read More