Historical Essays

Historical Essays2024-01-12T09:40:35-06:00

Historical eDJ Group essays from 2008-2018 have been migrated from the formal eDiscovery analyst site. Formatting, links and embedded images may be lost or corrupted in the migration. The legal technology market and practice has evolved rapidly and all historical content by eDJ analysts and guest authors were based on best knowledge when written and peer reviewed. This older content has been preserved for context and cannot be quoted or otherwise cited without written permission.

OK – So What’s The Plan?

Migrated from eDJGroupInc.com. Author: Kevin Esposito. Published: 2011-03-21 12:00:14  The children’s song “Do Re Mi” starts with the line “Let’s start at the very beginning, it’s a very good place to start”.  What seems like a standard concept even for children is anything but when operating in the world of eDiscovery.  In many engagements, we’re brought into the mix long after work has started [...]

Connecting Legal Hold Notification With Content Lock-Down

Greg Buckles’ recent post on legal hold notices reaching eDiscovery platforms hinted at something that I believe many organizations will be doing this year – connecting legal hold process management with execution of collection and preservation activities. While this would seem an obvious and not-so-revolutionary next step, it’s one that is not easy to implement and not necessarily specifically called for in any rules governing the practice of eDiscovery. Thus, I sense hesitation on the part of some practitioners. But, I believe the process management and IT benefits of making the connection will ultimately start to win out this year.

The Risks of Reusing Wiped Media for Productions

I try to read the actual opinions on cases that providers seize onto. Many times the actual fact pattern and conclusions are subject to interpretation. More importantly, there are often little facts or findings that are fascinating. In the case of Rosenthal Collins Group, LLC v. Trading Techs. Int’l, No. 05 C 4088, 2011 WL 722467 (N.D. Ill. Feb. 23, 2011), I chased down this rabbit hole to figure out exactly who had reset the last modified dates and why. The summaries all mention the plaintiff’s “agent” and I expected to find a service vendor, IT contractor or even a hard up consultant in the actual opinion. Instead, I found a tech savvy programmer/contractor/custodian who used utilities to forensically wipe all of his media and then reset his dates by changing his system clock. Bill Tolson’s blog title, Spoliation does not require purposeful destruction of evidence, focuses on District Judge Coleman’s $1,000,000 sanction and clear statements that the plaintiffs were responsible for their agents actions.

Changing Attitudes on Predictive Coding?

Lately, it seems like predictive coding is all over the eDiscovery blogosphere. The most recent example is Ben Kerschberg’s entry at Forbes.com law and technology blog. When we wrote about the topic last fall, a majority of readers believed that predictive coding was not defensible. I took a new look at the data on our poll question and found that attitudes are evolving.

Custodial Email Preservation – Email Infestation

Email is everywhere. We are seeing a lot of corporate clients making the transition from preservation notices to actual preservation/collection systems. Whether using an email archive, collection appliance or search software with connectors into Exchange, the IT administrators tend to interpret Legal’s custodial preservation request very literally. They still see email in the Mailbox model. When assessing the existing preservation process (if any), I almost always find gaps and unmanaged sources that slipped through the net. Public companies that have been around for more that 3-5 years have gone through M&A activities, RIFs, bankruptcies and other corporate wide reorganizations that leave ESI skeletons in the corporate closet. I have blogged recently about the tendency to create corporate digital landfills, but the recent string of preservation sanction cases has reaffirmed the need to know where your email hides.

We’ve Preserved Everything – Now What?

One of the first instructions that IT practitioners will hear from the legal department is “preserve everything”. It doesn’t matter what the context is or whether the information may or may not be relevant, at the first pass a lawyer will always tell you to preserve everything in sight. The problem with preserving information is that preservation is only half the battle – you need to be able to make use of it somewhere down the line and that’s a fact that sometimes gets lost in the shouting.

Email Greg Buckles with questions, comments or to set up a short Good Karma call.

Recent Comments

Active survey/polls

Categories

Archives

Disclaimer

Essays, comments and content of this site are purely personal perspectives, even when posted by industry experts, lawyers, consultants and other professionals. Greg Buckles and moderators do their best to weed out or point out fallacies, outdated tech, not-so-best practices and such. Do your own diligence or engage a professional to assess your unique situation.

Go to Top