Posts Tagged ‘esi’
Tips for Social Media Discovery & Data Preservation Pt.1
Social media has become a engrained way of how people network, communicate, and socialize outside of traditional communication methods such as calls, emails, and texts.
Read MoreRisks & Pitfalls Associated with Self-Collection in eDiscovery
For those well-versed in forensic collection and eDiscovery, the thought of a client self-collecting sends up immediate red flags. An improper collection hurts a case in many ways, from counsel losing confidence in their data to even spoliations and being asked to re-collect.
Read MoreWhat Is FTP And Why Is It Secure?
File Transfer Protocol, commonly known as FTP, is the method of using a standard network protocol to securely and confidentially transfer files via a computer network. There are various types of file transfer protocols but FTP is one of the more common methods used within the legal industry. FTP is typically secured through the attachment of SSL/TLS (FTPS).
Read MoreSummary of eDiscovery Rule 37(e): Failure to Preserve Electronically Stored Information (Safe Harbor)
FRCP Rule 37. Failure to Make Disclosures or Cooperate in Discovery: Sanctions (e) Failure to Preserve Electronically Stored Information. (f) Failure to Participate in Framing a Discovery Plan Essentially, Federal Rule 37(e) governs the requirement for competent preservation of discoverable information and ESI that may be related to the matter. Rule 37(f) addresses the need…
Read MoreTERIS eDiscovery Project Process: The 10 Key Steps
TERIS tightly manages an eDiscovery engagement by applying these 10 key industry-wide process steps, which help minimize the risks and exposure, while balancing the costs involved:
Read MoreRecent Florida Case Ruling Warns of Dangers with Self-Collection During Discovery
Rule 26(g) Signing of Discovery Requests, Responses, and Objections is the requirement of engagement in discovery in a defensible and responsible way. The rule was created to limit abuse in discovery through the use of sanctions. Discovery is an essential part of the legal process and as a result a party should be given the opportunity to properly prepare and develop their case. Rule 26(g) is brought in when there is a range of issues originating from the handling of ESI and proper collection of data most commonly when there is evidence of spoliation, failure to produce, lack of due diligence, and in this case self-collection.
Read More10 eDiscovery, Forensics & ESI Podcasts to Subscribe to in 2020
From data migrations to emerging technologies, here are some of the best podcasts (in no particular order) to subscribe to on the topics of eDiscovery, forensics, big data and more. Open up your favorite podcast app and dive into the best legal industry topics available online.
Read MoreAssess Risk After a Breach – Including Security Breach Notification Laws By State
A data breach occurs when there is an intentional or unintentional release of secure or private/confidential information to an untrusted environment. Data breaches can come in a plethora of forms, most commonly: ransomware, malware, phishing, denial of service & physical theft.
Read MoreCalifornia Consumer Privacy Act (CCPA) Overview
The California Consumer Privacy Act (CCPA) gives customers extensive new rights protecting their personal information. Under the new regulations business will need to publicly disclose their data sharing and privacy practices and give them the option to have their data cleared. One goal of this is to clear away unsolicited marketing and allow consumers the…
Read MoreControlling Your Data: Optical Character Recognition (OCR)
Optical Character Recognition (OCR) is technology that aids in converting paper based documents, images and large volume repositories into electronically searchable and archival data. OCR can work with both hard copy data and digital information helping reviewers and teams boost visibility and control over their data.
Read More