Migrated from eDJGroupInc.com. Author: Greg Buckles. Published: 2011-07-13 05:00:30Format, images and links may no longer function correctly. A lot of my week has been spent on calls prepping the ‘Using eDiscovery Technologies’ track of the Carmel by the Sea eDiscovery Retreat next week. When Chris LaCour first recruited Barry and I to create focus tracks, I loved the idea of a small, relaxed retreat where attendees could really interact with the speakers. I thought of it as the antithesis of the typical Legal Tech experience; crowded, commercial, chaotic. George Socha, Browning Mareen, Barry Murphy and myself collaborated to come up with four focus tracks, each with four sessions over the three days. I managed to hand over the ‘Defining the eDiscovery Platform’ to Kevin Stehr of Lexis Nexis to develop and moderate, but that still left me three sessions to wrangle with. I am pleased with my panelists and the materials that should be finalized early this week. I know that the retreat is a small venue and it may be hard to convince your management that you really will be learning about eDiscovery rather than hitting the links, but I see this as an excellent west coast opportunity to get quality content and real discussion from experts, judges and your contemporaries.

If you can make the retreat, here are the sessions that I will be moderating:

Validation Testing – Defending Your eDiscovery Process

Counsel does not like to admit that no technology is perfect. Any sufficiently large and diverse ESI collection will have indexing and processing exceptions that should be defined, documented and declared when possible. This session will explore common search and processing exceptions, the reasonableness standard for acceptance testing systems and cases that have shaped the defensibility landscape.

Speakers: Herb Roitblat and Jason Velasco

Protecting Sensitive Corporate ESI in Discovery

The scope and complexity of discovery collections can put critical corporate information at risk of unprotected disclosure. Beyond manual privilege review, collections contain price lists, personal identification information, trade secrets, employee salaries and many other pieces of confidential information. This session will explore the categories, formats and sources of sensitive corporate ESI. We will discuss technologies, processes and strategies for identifying, designating and protecting these critical information assets.

Speakers: Andrew Clauss, Aaron Crews, Erik Laykin and Maureen O’Neil

Handling Emerging ESI Sources

Corporate communications have escaped the PST file. Critical custodians are using instant messaging, Facebook, SharePoint and a myriad of other communication platforms to make decisions and conduct business. This session will define the categories, storage formats, potential preservation/collection methods, review challenges and other aspects of handling new ESI sources.

Speakers: Mary Pat Poteet, Tauri Schow and Richard Cheng

0 0 votes
Article Rating