Historical eDJ Group essays from 2008-2018 have been migrated from the formal eDiscovery analyst site. Formatting, links and embedded images may be lost or corrupted in the migration. The legal technology market and practice has evolved rapidly and all historical content by eDJ analysts and guest authors were based on best knowledge when written and peer reviewed. This older content has been preserved for context and cannot be quoted or otherwise cited without written permission.
OK – So What’s The Plan?
Migrated from eDJGroupInc.com. Author: Kevin Esposito. Published: 2011-03-21 12:00:14 The children’s song “Do Re Mi” starts with the line “Let’s start at the very beginning, it’s a very good place to start”. What seems like a standard concept even for children is anything but when operating in the world of eDiscovery. In many engagements, we’re brought into the mix long after work has started [...]
Connecting Legal Hold Notification With Content Lock-Down
Greg Buckles’ recent post on legal hold notices reaching eDiscovery platforms hinted at something that I believe many organizations will be doing this year – connecting legal hold process management with execution of collection and preservation activities. While this would seem an obvious and not-so-revolutionary next step, it’s one that is not easy to implement and not necessarily specifically called for in any rules governing the practice of eDiscovery. Thus, I sense hesitation on the part of some practitioners. But, I believe the process management and IT benefits of making the connection will ultimately start to win out this year.
The Risks of Reusing Wiped Media for Productions
I try to read the actual opinions on cases that providers seize onto. Many times the actual fact pattern and conclusions are subject to interpretation. More importantly, there are often little facts or findings that are fascinating. In the case of Rosenthal Collins Group, LLC v. Trading Techs. Int’l, No. 05 C 4088, 2011 WL 722467 (N.D. Ill. Feb. 23, 2011), I chased down this rabbit hole to figure out exactly who had reset the last modified dates and why. The summaries all mention the plaintiff’s “agent” and I expected to find a service vendor, IT contractor or even a hard up consultant in the actual opinion. Instead, I found a tech savvy programmer/contractor/custodian who used utilities to forensically wipe all of his media and then reset his dates by changing his system clock. Bill Tolson’s blog title, Spoliation does not require purposeful destruction of evidence, focuses on District Judge Coleman’s $1,000,000 sanction and clear statements that the plaintiffs were responsible for their agents actions.
Changing Attitudes on Predictive Coding?
Lately, it seems like predictive coding is all over the eDiscovery blogosphere. The most recent example is Ben Kerschberg’s entry at Forbes.com law and technology blog. When we wrote about the topic last fall, a majority of readers believed that predictive coding was not defensible. I took a new look at the data on our poll question and found that attitudes are evolving.
Custodial Email Preservation – Email Infestation
Email is everywhere. We are seeing a lot of corporate clients making the transition from preservation notices to actual preservation/collection systems. Whether using an email archive, collection appliance or search software with connectors into Exchange, the IT administrators tend to interpret Legal’s custodial preservation request very literally. They still see email in the Mailbox model. When assessing the existing preservation process (if any), I almost always find gaps and unmanaged sources that slipped through the net. Public companies that have been around for more that 3-5 years have gone through M&A activities, RIFs, bankruptcies and other corporate wide reorganizations that leave ESI skeletons in the corporate closet. I have blogged recently about the tendency to create corporate digital landfills, but the recent string of preservation sanction cases has reaffirmed the need to know where your email hides.
We’ve Preserved Everything – Now What?
One of the first instructions that IT practitioners will hear from the legal department is “preserve everything”. It doesn’t matter what the context is or whether the information may or may not be relevant, at the first pass a lawyer will always tell you to preserve everything in sight. The problem with preserving information is that preservation is only half the battle – you need to be able to make use of it somewhere down the line and that’s a fact that sometimes gets lost in the shouting.
Email Greg Buckles with questions, comments or to set up a short Good Karma call.
Active survey/polls
Categories
Archives
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- April 2023
- March 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- May 2019
Disclaimer
Essays, comments and content of this site are purely personal perspectives, even when posted by industry experts, lawyers, consultants and other professionals. Greg Buckles and moderators do their best to weed out or point out fallacies, outdated tech, not-so-best practices and such. Do your own diligence or engage a professional to assess your unique situation.
Recent Comments