Surveillance cameras are ubiquitous these days. Whether captured on doorbell cams, car dashboards, in parking garages, or in businesses, video surveillance footage is often requested and highly sought-after by litigants attempting to prove their cases in court. But what happens when the opposing party fails to provide this valuable ESI?
What happens when attorneys and their clients disregard both the spirit and letter of the FRCP’s eDiscovery rules? As illustrated in the case below, very bad things.
Even federal judges have breaking points, and after more than 8 years, 400+ docket entries, and an almost incomprehensible number of ESI blunders, defendants and their counsel unfortunately (but not surprisingly) found themselves on the exploding end of a 103-page, court-imposed sanctions truth-bomb.
We’re living in a time when social media has supplanted email as the primary means of electronic communication.
Social media is everywhere: Facebook, Twitter, LinkedIn, Instagram, Snapchat, and more take up more and more screen time - especially in a COVID era with more of us reliant on our screens for communication.
Apps that were once dominated by teens and twenty-somethings are increasingly used by their parents and grandparents. The President of the United States regularly sends late night...
Successful eDiscovery document review project are characterized by both speed and accuracy.
eDiscovery Project Managers (PMs) work in an environment where “I’m on vacation,” “It’s Christmas,” or “I just woke up after open-heart surgery” are rarely suitable reasons to tell a client no.
The ongoing COVID-19 pandemic has fundamentally alteredhow most individuals and businesses are conducting their daily affairs. Chief among these adjustments has been a newfounddependence on remote technology.
So, your organization is engaged in, or reasonably anticipates:
- Litigation defense
- Regulatory investigation (especially if you're held to GDPR or CCPA)
- Or other legal dispute
State and federal statutes, court rules, and government regulations each promulgate, frame, and define an organization’s obligations to identify relevant electronically stored information (“ESI”) when such conflicts arise. Identification is arguably among the most important responsibilities an...
You have too much data. The financial, operational, and reputational risks of that problem manifest themselves in data breaches and cybersecurity attacks every day.
IoT, mobile devices, Slack, Microsoft Teams, email threads, CRM data from growing inside sales and marketing teams...the volume of data being created is exploding. And that's all before sifting through it in the event of an investigation or litigation event. A proactive Information Governance policy will help you defensibly reduce...