“The 2006 amendments never addressed the real problems inherent in the system. Jablonski said. The committee made incremental changes that in some respects are adding to the problem,”
Do we need privilege logs anymore? First, let’s discuss the advantages, disadvantages and best practices when implementing 502 orders and agreements.
This whitepaper will take a closer look at the pros and cons of using contractual agreements to limit certain aspects of eDiscovery.
Verify that the vendor has the ability to keep your client’s data safe, but also verify your litigation support department has vetted the vendor. Here are eight topics to focus on when vetting an eDiscovery vendor.
By Peter Coons, SVP, Strategic Intitiatives Even small cases need to adhere to e-discovery best practices. This principle comes through loud and clear in a recent New York Supreme Court decision. In this breach of contract action, plaintiff QK Healthcare (QKH) was seeking to recover more than $70,000 from defendant Forest Laboratories (Forest). Forest refused [...]
II of III: Support vector and conceptual search; how they work, what they do and which are appropriate for particular use cases.
Corporations allocate significant time and money for protecting their digital intellectual property. 7 Tips for better Law Firm Security
The primary benefit of TAR is to prioritize documents within a corpus by likelihood of relevance as early as possible in the eDiscovery lifecycle.
By Chuck Kellner, SVP, Discovery Engineering This is the first of three articles to assist with cost factors and ROI for e-discovery. Assessing e-discovery costs can be challenging. Compared to outside legal fees or offers of settlement, the value isn’t always transparent. So it may be useful to assess e-discovery technology by return on [...]