Last week, we covered the Burd v. Ford Motor Co. case where the court granted the plaintiff’s motion for a deposition of a Rule 30(b)(6) witness on the defendant’s search and collection methodology involving self-collection of responsive documents by custodians based on search instructions provided by counsel. In light of that case and a recent client experience of mine, I thought it would be appropriate to revisit this topic that we addressed a couple of years ago.
Friday, we wrote about tracking file counts from collection to production, the concept of expanded file counts, and the categorization of files during processing. Today, let’s walk through a scenario to show how the files collected are accounted for during the discovery process.
A while back, we wrote about Quality Assurance (QA) and Quality Control (QC) in the eDiscovery process. Both are important in improving the quality of work product and making the eDiscovery process more defensible overall. With regard to QC, an overall QC mechanism is tracking of document counts through the discovery process, especially from collection to production, to identify how every collected file was handled and why each non-produced document was not produced.
In Malibu Media, LLC v. Tashiro, Indiana Magistrate Judge Mark J. Dinsmore issued a Report and Recommendation on Plaintiff’s Motion for Sanctions, recommending that the Court grant the plaintiff's motion against the defendants for spoliation of evidence and perjury and enter default judgment against the defendants.
If you think the NSA is tough, hell hath no fury like a suspicious spouse scorned.
Most discovery requests include a request for emails of parties involved in the case. Email data is often the best resource for establishing a timeline of communications in the case and Microsoft® Outlook is the most common email program used in business today. Outlook emails can be stored in several different forms, so it’s important to be able to account for each file format when collecting emails that may be responsive to the discovery request.
While the Electronic Discovery Reference Model from EDRM has become the standard model for the workflow of the process for handling electronically stored information (ESI) in discovery, it might be helpful to think about the EDRM model backwards, whether you’re the producing party or the receiving party.
Early in the life of this blog, we published a blog post called eDiscovery 101: Simply Deleting a File Doesn’t Mean It’s Gone to try to help our readers understand how disk drives keep track of files and how “deleted” files often can still be recovered. Something tells me that basic forensic concept will become a big issue in the coming weeks and months regarding Hillary Clinton’s deleted emails.
Today’s thought leader is Alon Israely. Alon is the Manager of Strategic Partnerships at Business Intelligence Associates, Inc. (BIA) and currently leads the Strategic Partner Program at BIA. Alon has over eighteen years of experience in a variety of advanced computing-related technologies and has consulted with law firms and corporations on a variety of technology issues, including expert witness services related to computer forensics, digital evidence management and data security. Alon is an attorney and a Certified Information Systems Security Professional (CISSP).
Today’s thought leader is Brad Jenkins of CloudNine™. Brad has over 20 years of experience as an entrepreneur, as well as 15 years leading customer focused companies in the litigation support arena. Brad has authored several articles on document management and litigation support issues, and has appeared as a speaker before national audiences on document management practices and solutions. He’s also my boss!
When a case is filed, several activities must be completed within a short period of time (often as soon as the first seven to ten days after filing) to enable you to assess the scope of the case, where the key electronically stored information (ESI) is located and whether to proceed with the case or attempt to settle with opposing counsel. Here are several of the key early activities that can assist in deciding whether to litigate or settle the case.
One of the items that I bought my wife for Christmas (which she really wanted) was an UP 24™ Fitness Tracker, which is a wristband that tracks a variety of fitness metrics, including steps taken, workouts logged and calories burned (not to mention sleep cycles) and enables you to share and compare your stats with your friends via an app on your mobile device. Another example of a similar device is a Fitbit®. Based on a recent case, these devices are just another example of new devices from which relevant ESI may be collected for discovery.
They say that a joke is only old if you haven’t heard it before. In that vein, an article about eDiscovery is only old if you haven’t read it before. Craig Ball is currently revisiting some topics that he covered ten years ago with an updated look, making them appropriate for 1) people who weren’t working in eDiscovery ten years ago (which is probably a lot of you), 2) people who haven’t read the articles previously and 3) people who have read the articles previously, but haven’t seen his updated takes. In other words, everybody.
In Design Basics, LLC. v. Carhart Lumber Co., Nebraska Magistrate Judge Cheryl R. Zwart, after an extensive hearing on the plaintiff's motion to compel “full disk imaging of Defendant's hard drives, including Defendant's POS server, secretaries' computers, UBS devices. . .”, denied the motion after invoking the mandatory balancing test provided in FRCP Rule 26(b)(2)(C).
When a file is “deleted” (i.e., actually deleted, not just moved to the Recycle Bin), the data for that file isn’t actually removed from the disk (in most cases). So, where does it go? Let's find out.
When litigation hits, key activities to get a jump on the case include creating a list of key employees most likely to have documents relevant to the litigation and interviewing those key employees, as well as key department representatives, such as IT for information about retention and destruction policies. These steps are especially important as they may shed light on custodians you might not think about – the departed.
A new self-assessment resource from EDRM helps you answer that question. A few days ago, EDRM announced the release of the EDRM eDiscovery Maturity Self-Assessment Test (eMSAT-1), the “first self-assessment resource to help organizations measure their eDiscovery maturity”. Find out more about it here.
In Boston Scientific Corporation v. Lee, California Magistrate Judge Paul S. Grewal found time to preside over a case other than Apple v. Samsung and granted the motion to quash the plaintiff’s subpoena for the defendant’s laptops, refusing the plaintiff’s fallback position to meet and confer and referencing Leave it to Beaver in the process.
When we launched nearly four years ago on September 20, 2010, our goal was to be a daily resource for eDiscovery news and analysis. Now, after doing so each business day, I’m happy to announce that today is our 1,000th post on eDiscovery Daily! Check out what we've covered over 1,000 posts!
In Zeller v. So. Central Emergency Med. Servs. Inc., Pennsylvania Magistrate Judge Karoline Mehalchick used the Zubulake seven factor test to rule that the costs for restoring and searching the plaintiff's emails should be shared, up to a maximum contribution by $1,500 by the plaintiff.
Browse eDiscovery Daily Blog