In February, we discussed a report about data breach trends in 2014 and how those trends compared to data breaches in 2013. That report provided breach trends for several industries, including the healthcare industry, which suffered the most breaches last year (possibly because stolen health records are apparently worth big money). But, according to a recent report, you won’t see any trends for law firms because the legal profession almost never publicly discloses a breach.
It’s hard to believe, but ten years ago this past Monday, the verdict was rendered in the Zubulake v. UBS Warburg LLC case. Let’s take a look back at the case and see what Laura Zubulake is doing today.
Yesterday, we discussed how corporate logo graphic files in email signatures can add complexity when managing those emails in eDiscovery, as these logos, repeated over and over again, can add up to a significant percentage of your collection on a file count basis. Today, we are going to discuss a couple of ways that I have worked with clients to manage those files during the review process.
Many, if not most of us, use some sort of graphic in our email signature at work that represents our corporate logo and many organizations have created a standard email signature for their employees to use when corresponding with others. It’s another subtle way of promoting brand recognition. But, those logos can add complexity when managing those emails in eDiscovery.
In Harrell v. Pathmark et al., Pennsylvania District Judge Gene E. K. Pratter, after a hearing to consider whether to draw an adverse inverse instruction due to the defendant’s possible spoliation of video evidence, determined that “a spoliation inference would not be appropriate here”. Finding that the plaintiff had presented no evidence that the defendant had constructive notice of a dangerous condition resulting in her slip and fall, Judge Pratter also granted the defendant’s motion for summary judgment.
Browse eDiscovery Daily Blog