Production

The Discoverability of IoT Devices

What are IoT Devices

The Internet has transformed the way we conduct daily chores. Simple objects such as fridges, watches, doorbells, and washing machines can now be connected to secure networks. This technology is quick, efficient, and the perfect replacement for manual tasks. Whenever the user is within range and connected to WiFi, IoT devices can be used to turn on the lights, preheat the oven, and more. But what exactly is the definition of an IoT device? IoT is shorthand for the Internet of Things, a term used to describe physical objects that transmit data through wireless networks. [1] Fortunately for legal teams, IoT devices are effective in the courtroom as well as the home.

IoT Devices in Court

  • Four years ago in Arkansas, data from an Amazon Echo was used to investigate the death of Victor Collins. When Collins was found dead in his hot tub, his friend James Bates was charged with first-degree murder and evidence tampering. The charges were later dismissed due to reasonable doubt amongst the court. Unfortunately, news sources haven’t disclosed what the voice recordings revealed. [2]
  • After Timothy Burke was accused of shooting his brother, the prosecutor requested the admittance of audios from a Ring doorbell. The defendant objected to its admittance, claiming that it violated New York’s wiretapping and eavesdropping law. The objection was overruled. [3]
  • In an aggravated arson and insurance fraud case, Ross Compton’s guilt was proven by his pacemaker. The man claimed that he packed up his belongings and threw them out the window after discovering the fire. Medical examiners concluded that the pacemaker’s heart rate and cardiac rhythm data disproved Compton’s claims. [4]
  • In State of Wisconsin v. Burch, the defendant was accused of killing her boyfriend. However, the charges were dropped after Fitbit data revealed that Burch had only taken 12 steps in the hours before the death. [5]

Key Considerations

  • Legal teams should explain the significance of IoT data to their clients and evaluate any IoT devices that might be useful.
  • During (or in the prospect of) litigation, disable auto-deletion features on IoT devices.
  • Investigate the reliability of the device’s data.
  • Assess the accessibility of IoT data and the cost of its production. [6]

Conclusion

IoT devices are too valuable to be overlooked in litigation. As demonstrated by the aforementioned court cases, IoT data is quite useful in criminal cases. However, its utility doesn’t stop there. IoT data can also play a significant part in personal injury claims, family law, IP litigation, and more. It would be remiss of litigants to ignore IoT devices during the discovery process. Instead, litigants should consider the relevance and proportionality of IoT devices when drafting their ESI protocol.

 

[1] Brian Morrison and Joann Militano, “E-Discovery for IoT Devices: Primer for Representing Individual Clients,” New York Law Journal, February 1, 2021, https://advance.lexis.com/api/document?collection=legalnews&id=urn:contentItem:61X0-8FG1-JBM3-R471-00000-00&context=1516831.

[2] Erik De La Garza, “Charges Dropped in Amazon Echo Murder Case,” Courthouse News Service, November 29, 2017, https://www.courthousenews.com/charges-dropped-in-amazon-echo-murder-case/

[3] Kimberley Haas, “Judge: Audio from Ring doorbell can be used as evidence in Rochester shooting case,” New Hampshire Union Leader, March 5, 2020, https://www.unionleader.com/news/crime/judge-audio-from-ring-doorbell-can-be-used-as-evidence-in-rochester-shooting-case/article_ee1ddcd1-b193-5ec9-ad9b-08c22fbcdc2f.html

[4] Debra Cassens Weiss, “Data on Man’s Pacemaker Led to His Arrest on Arson Charges,” ABA Journal, February 16, 2017, https://www.abajournal.com/news/article/data_on_mans_pacemaker_led_to_his_arrest_on_arson_charges

[5] Greg Goth. “Can Wearables Testify Against Their Owners?” IEEE Spectrum, Sept. 27, 2021, https://spectrum.ieee.org/wearable-data-court

[6] Briar Morrison and Joann Militano, “E-Discovery for IoT Devices: Primer for Representing Individual Clients.”

Problems and Solutions for Slack Discovery

The Discoverability of Slack

As people turned to remote work in 2020, collaboration apps became a prevalent form of communication. Slack was so popular that some considered it to be the “new email.” Though some legal teams refute its discoverability, the FRCP intentionally established a broad definition of ESI to accommodate new data types. From corporate files to humorous GIFS and standard channel messages, Slack is a medium for large quantities of information. Thus, the application fits the requirements for discoverable digital evidence.[1] Accessing and producing that information, however, can present several challenges.

Production Problems

  1. Hundreds of Slack messages are sent every day.

Medium and large-scale corporations with active Slack users easily send over 100,000 Slack messages per month. Additionally, Slack generates a new file per day for each channel. Examinations of big data are slow and expensive. By proactively identifying specific channels to preserve, litigants can reduce production costs and time.[2]

  1. Slack is only one of many hosts for decentralized communications.

Nowadays, a single conversation can span multiple platforms. For example, if an employee asks their boss a question through email, they may hold a Zoom meeting to discuss it. After the Zoom meeting, they might use Slack to address any follow-up questions. Since the conversation was spread out, the snippet captured on Slack will lack the full context.

  1. Deciphering Slack exports can be difficult.

Slack messages are exported through JSON files, a format that’s a bit hard to understand. Additionally, the files don’t visually display media such as emojis and GIFS. In response to this problem, legal teams may opt to use screenshots as an alternative production method. However, the application only allows users to view and sort through the most recent 10,000 messages.[3]

Tips to Keep in Mind

  • Educate your employees or legal team about Slack’s retention policies.
  • If possible, consider upgrading to Slack’s premium version so that there is no message history limit.
  • Find an eDiscovery solution that will export Slack data in a thorough and understandable format.
  • Avoid preserving unneeded data by identifying which channels are more important than others.[4]

 

[1] Peter Callaghan, “Is Slack Content Discoverable? Yes It (Definitely) Is,” Pagefreezer, https://blog.pagefreezer.com/slack-content-is-discoverable

[2] Matthew Verga, “Discovery from Slack: It’s Complicated,” Xact Data Discovery, June 19, 2020, https://xactdatadiscovery.com/articles/discovery-from-slack-its-complicated/

[3] James Murphy, “The Shark in the Wave: Revealing the Lurking Danger of Slack Data,” Corporate Compliance Insights, June 17, 2019, https://www.corporatecomplianceinsights.com/the-shark-in-the-wave-revealing-the-lurking-danger-of-slack-data/

[4] James Murphy, “The Shark in the Wave: Revealing the Lurking Danger of Slack Data.”

Data Processing: The Key To Expanding Your LSP’s Bottom Line

Ask any legal service provider (LSP) about how they can increase their revenue and you’ll undoubtedly get a variety of answers, such as:

  • Go paperless
  • Use different fee structures
  • Fire non paying clients
  • Automate labor intensive tasks

While opportunities vary depending on a variety of factors, one consistent challenge you might come across is setting aside the time to explore any new possibilities. Freeing up time will allow your LSP to grow in new and unexpected ways and give your organization the flexibility to adapt to unforeseen demands.

All you have to do is find ways to increase your productivity and the easiest way to do this is through new technology. In fact, many law firms are already headed in this direction:

  • 53% of law firms think technology will boost their revenue by allowing them to offer better services.
  • 65% of law firms increased their technology investments in 2019.
  • 25% of tech budgets were allocated to ‘innovative technologies.’

Where’s the best place to start?  Simple. You need to streamline your data processing workflows.

 

Common Data Processing Challenges You Might Encounter

Not all data processing tools are designed equally. There are some that present their own unique challenges that could hinder your ability to meet your true potential.

In order to streamline and free up your LSP’s time, keep the following in mind when looking at potential data processing tools:

  • Can you edit and add newly discovered fields?
    • Having the flexibility to edit and add newly discovered fields will prevent your team from having to review data over and over again.
  • Should every piece of data be pushed to the review platform?
    • If every piece of data is pushed to the eDiscovery review platform, your LSP may have to pay higher hosting fees.
  • Is the data stored in a public cloud-based environment?
    • Storing data in the public cloud could cause your organization to lose control of the data and hosting costs.
  • Can you filter out data with a true NIST list?
    • This provides your organization insight into another level of data that doesn’t need to be reviewed, and sometimes, can be used to inflate your case.

Some companies charge $15 per GB per month to host your data in a public cloud environment. That doesn’t give you much room to work with when offering the best deal with your clients.

The alternative? Hosting your data in the private cloud allows you to have more control over hosting costs, which allows you to boost your bottom line. Having a data management tool in place will grant your LSP the data control and security you need.  For even more ways to build value with CloudNine, download our eBook: 4 Ways Legal Service Providers Can Build Value and Boost Margins.

The Perks of Being an Efficient Data Processing Tool

Storing your raw data on-prem or in a private cloud lets you control your hosting costs, often dropping the cost down to less than $1 per GB per month. This allows you to reasonably mark up your hosting costs, boosting your bottom line while still providing good value for your clients.

Determining the efficiency of a data processing tool comes down to two factors:

  1. How you’re using the eDiscovery tool
  2. Your data size

The more data you have, the longer it will take to process. Setting up your data processing engine to perform top-level culls removes duplicative or irrelevant data before your even begin. This cuts down on the amount of data pushed further down the line within the workflow.

An efficient data processing tool allows for more automation, allowing you to work on other tasks and optimizing your employee’s time on the clock.

A truly efficient tool allows you to set alerts that let you or the next person in the workflow know when processing is complete. This means you don’t have to have anyone sitting there, watching and waiting for the system to complete its task.

 

How CloudNine Explore Can Save You Time and Money

In many cases, CloudNine Explore saves you approximately 30% of your costs associated with the interaction between your data and your team. If you are asking how that is possible, we break down 4 money-saving tips in our latest eBook.

Through our data culling functionality that removes duplicate data points, we reduce the amount of data you send to review.

Plus, other platforms make a copy of your data as you expand it, creating duplicative and irrelevant data that you have to pay to store. In CloudNine Explore, your data is only expanded after it’s culled and filtered, removing irrelevant data along the way. It’s only then that your data is copied and exported to your review platform.

By reducing this initial data size, you save hosting costs and time further down the workflow process.

  • Analyze your data quicker
  • Process your data more efficiently
  • Speed up decision-making processes

If you’re ready to utilize eDiscovery law software to improve your data process efficiencies so you have more time and money to explore new, alternative revenue streams, let CloudNine help you. Sign up for our free demo today.

 

Evaluate a Proven Approach to eDiscovery and Data Processing with CloudNine Explore

The digital age has had a major impact on more than just how we occupy our free time. It’s also changed the way we review and process legal data.  

 Lawyers and paralegals handle much more than the physical evidence of discovery. Most law firms sift through unprecedented volumes of evidence that come with the digital age. 

 

When Data Volumes Exceed Capacity: Controlling The Ever Growing Amount of Data

Legal service providers (LSPs) review and process massive sets of complex and diverse digital content oftentimes, in the terabytes. For context, consider this comparison of data:

  • 1 MB = a 400-page book
  • 1 GB = over a thousand 400-page books
  • 1 TB = more than a million 400-page books

Faced with this overwhelming volume of data, an eDiscovery solution capable of working at a high speed and top-of-the-line accuracy will equip you to fight your cases with maximum efficiency. 

Reaping the Benefits Out of Cloud-Based Discovery Software

You can also lose control of your data in expensive cloud platforms. You’re completely dependent on THEIR solution, as they hold your data hostage indefinitely, at whatever rates they set.  Plus, if an eDiscovery solution doesn’t have the capacity to scale with your ever-increasing data needs or carry the solutions you need, you can suffer from ineffective workflow functionality. 

Your organization needs an eDiscovery solution that provides you with:

  • A great degree of workflow flexibility with on-premise and cloud solutions
  • The ability to add new fields, as needed
  • The power to flex up and down the data storage as you consume, allowing you to only pay for what you need
  • The process of continuous improvement in regards to their data processing engine

With a cloud-based eDiscovery solution capable of handling the volume and variety of data you have in addition to the functionality and features you need, you will be able to work efficiently.

 

Evaluating The CloudNine Explore Solution

As the industry leader for processing eDiscovery data, CloudNine Explore is based on four key components:

  • Explore
  • Assess
  • Protect
  • Deliver

Explore:  

CloudNine Explore helps you navigate your way through massive volumes of data to identify risk, determine the scope of the project and control your costs. This helps you uncover important information about the data before you begin:

  • How much data is there?
  • What type of data has been collected?
  • What languages are included in the data?
  • What data is hidden from view?
  • Where did the data come from?

Knowing this information will help you evaluate the risk and potential cost of litigation at the earliest possible point.   This knowledge enables you to set more realistic costs to process and store the data, as well as to determine the size of your review team and necessary skill sets. 

Assess:  

With CloudNine Explore, you can inspect and review your data using both automated and manual processes. When you receive hundreds of thousands of documents and files through eDiscovery, you need to be able to process through it quickly and efficiently. CloudNine Explore’s multi-threaded, multi-core indexing functionality helps you filter through your exported data faster so you can pull only the data you need. 

Being thoughtful about your research and using specific keyword search terms to promote specific documents, helps you filter out data like specific email domain names for later review.

Protect:  

If the integrity of your data is compromised, lost, distorted or manipulated, the consequence can be devastating to your case. 

CloudNine Explore allows you to securely upload, ingest and preserve all relevant data for your ongoing investigations or litigation with an easier and more efficient eDiscovery platform.

All your data is stored securely in a single, on-prem location, housed safely behind the firewall. This safety net saves money while giving you direct access to your data so you know exactly where it is at all times.

Deliver:  

Sharing discovered assets with the opposing side for review is more than a courtesy, it’s required.  CloudNine Explore makes it easy to provide information as required for legal production or further investigation so you stay compliant. 

Avoid costly and time-consuming production of redundant and unnecessary documents while reducing the risk of producing privileged or protected content. 

 

Faster Data Ingestion, Faster ROI With CloudNine Explore

CloudNine Explore saves you money, which in turn positions your project to yield high ROI. 

  • Explore works extremely fast, which means less time spent processing and reviewing data. 
  • Explore stores your data securely in a single, on-prem location, which provides your organization with consistent and transparent pricing. 
  • Integration costs are minimal because of its simplicity. Installation, scale, and automation are simple and straightforward. You don’t even need an IT department to deploy it. 

Now that you’ve learned how CloudNine Explore allows you to safely store and process your data; request a free demo to learn how you can save time and money.

 

Authenticating Communication Screenshots

Text messages and social media evidence can offer a plethora of relevant data. However, screenshots are not a reliable form of authenticating digital communication. Whether its Slack, Facebook Messenger, or email, screenshots of digital evidence can be easily fabricated.

Screenshot Failures in Court

  • Rossbach v. Montefiore Medical Center: To substantiate claims of workplace harassment and wrongful termination, the plaintiff submitted text screenshots from her former employer. The suit was dismissed after the court noticed emojis that an iPhone 5 is unable to depict.[1]
  • Moroccanoil v. Marc Anthony Cosmetics: In this trademark case, the court dismissed Facebook screenshots because of insufficient circumstantial evidence.[2]
  • R v. Martin: Facebook screenshots submitted to the police through an anonymous source were rejected by the court. The judge held that the anonymous source and the police couldn’t validate the authenticity of the evidence.[3]

How to Authenticate a Text Message Screenshot

Rule 901(b) of the Federal Rules of Evidence offers examples of authenticating all forms of digital evidence. The following are examples that are most applicable to screenshots of text messages:

  • Testimony of a Witness with Knowledge
  • Comparison by an Expert Witness or the Trier of Fact
  • Distinctive Characteristics and the Like
  • Evidence About Public Records
  • Methods Provided by a Statute or Rule (e.g. phone company records)[4]

How to Authenticate a Social Media Screenshot

  • Testimony from the alleged poster claiming ownership of the profile in question.
  • Expert testimony validating that the content originated from the alleged creator’s device.
  • Witness testimony confirming that the alleged author was the true creator of the content based on distinct characteristics.[5]
  • Testimony from the social media network stating that the alleged creator of the post(s) had exclusive access to the device in question and social media account.[6]

Conclusion

Though screenshots may seem like an easy ESI production method, it’s best to collect evidence from native files. However, Rene v. State of Texas demonstrates that screenshots can be helpful when utilized correctly. In this case, the defense argued against the admittance of evidence from the defendant’s MySpace account. They maintained there was no evidence of when the pictures were taken, who captured them, or if they were real. Yet, the court approved their admittance because more compelling data supported the evidence in the screenshot.[7] Rene v. State of Texas exemplifies that communication screenshots are best utilized as supporting evidence rather than the foundation of an argument.

 

[1] Philip Favro, “Fabricated Text Message Case Highlights the Importance of Emojis in E-Discovery,” Legaltech News, August 16, 2021, https://www.law.com/legaltechnews/2021/08/16/fabricated-text-message-case-highlights-the-importance-of-emojis-in-e-discovery/?kw=Fabricated%20Text%20Message%20Case%20Highlights%20the%20Importance%20of%20Emojis%20in%20E-Discovery

[2] “Court Cases Involving Social Media,” Bosco Legal Services, Inc. Accessed August 22, 2021, https://www.boscolegal.org/court-resources/social-media-case-law/

[3] Ramna Safeer, “Shedding Light on Screenshots as Electronic Evidence,” Thecourt.ca, January 18, 2021. http://www.thecourt.ca/r-v-martin-shedding-light-on-screenshots-as-electronic-evidence/

[4] “Rule 901 – Authenticating or Identifying Evidence,” Rules of Evidence, Accessed August 23, 2021, https://www.rulesofevidence.org/article-ix/rule-901/

[5] Denise A. Blake, “Social Media Evidence at Trial,” The People’s Law Library of Maryland, May 19, 2021, https://www.peoples-law.org/social-media-evidence-trial

[6] Michaela Battista Sozio, “Authenticating Digital Evidence at Trial,” American Bar Association, April 27, 2017, https://www.americanbar.org/groups/business_law/publications/blt/2017/04/03_sozio/

[7] “Court Cases Involving Social Media,” Bosco Legal Services, Inc. Accessed August 22, 2021, https://www.boscolegal.org/court-resources/social-media-case-law/

What Happened in Vegas? It’s No Secret – Read the Buzz

With many reasons to celebrate, CloudNine is still enjoying the excitement of our time Vegas last week. Visiting with valued customers and meeting new contacts are always fortunate opportunities. As an enhancement to those already fruitful conversations, we were thrilled to announce our expanded capabilities through the acquisition of ESI Analyst. Adding modern communication formats such as mobile, chat, social media and more to CloudNine’s powerful and proven applications, fills the market need to manage eDiscovery more effectively, with both modern and traditional data types, on a single platform.

The buzz of our expansion reached the news feeds across multiple social media channels.  A few highlights include:


 

Demonstrations are being scheduled now to debut CloudNine’s new technology – click to request a time to speak and a member of our team will be in touch to schedule.

 

Ready to try it out for yourself?  Request a free demo and see how CloudNine can help you.

Focusing on speed, security, simplicity, and services, CloudNine is dedicated to empowering our law firm and LSP clients with proven eDiscovery software solutions for litigation, investigations, and audits. 

Release Preview LAW 7.6

As data volumes grow, fortunately so has computer processing power.  CloudNine LAW and Explore 7.6 will take advantage of this power boost to amplify your speed to review and production.  The import technology behind both LAW’s Turbo Import and Explore uses a computer’s multiple processing cores more efficiently, making processing faster.

The application updates will include over 200 enhancements to build upon the already strong, import speeds of LAW and Explore.  The most notable improvement in LAW will be the introduction of a Turbo Imaging that can be used in parallel with existing imaging.  Turbo leverages near-native imaging technology to create static images of native files without relying on the native application.  This saves time while imaging, because the files don’t have to be opened, printed to image, and then closed.  The module can also take advantage of multiple processing cores, if available.  With imaging speeds up to eight times faster than the traditional imaging license, Turbo Imaging generates production-ready images quickly and easily.

In Explore, users will benefit from improved reporting capabilities.  This builds on Explore’s email threading, near duplicate detection, advanced filtering and integration with Relativity to provide a first-class, early case assessment experience, allowing clients to reduce the volume of data promoted for review by as much as 70%.  The import and ECA processes are all done without creating additional copies of the data until the client is ready to commit an export of potentially responsive content for further review.  This saves clients from storing copies of data that they don’t need, reducing cost and risk associated with managing multiple identical files.

To learn more about these and other enhancements coming in CloudNine LAW and Explore 7.6, please reach out to your account manager, or email us at info@cloudnine.com to schedule an overview and demonstration.  We’re excited to give you a preview of these updates and plan a wider release in the week of September 13th, 2021.

 

Focusing on speed, security, simplicity, and services, CloudNine is dedicated to empowering our law firm and LSP clients with proven eDiscovery software solutions for litigation, investigations, and audits. 

Ready to try it out for yourself?  Request a free demo and see how CloudNine can help you.

Court Denies Plaintiff’s Sanctions Request, Points Out Her Own “Misconduct”: eDiscovery Case Law

In Vaks v. Quinlan, et al., No. 18-12571-LTS (D. Mass. Feb. 24, 2020), Massachusetts District Judge Leo T. Sorokin denied the plaintiff’s Motion to Compel and for Sanctions, calling her accusations “without basis” and pointing out her own “pattern of misconduct and disregard of the governing rules”.

Case Background

In this case involving claims of age discrimination by the plaintiff against the defendants, the plaintiff, in filing the motion, accused the defendants and their attorneys of: (1) “obstructing” a deposition; (2) “relentless refusal to produce documents”; and (3) “defiantly [and] in bad faith violat[ing] every Federal Rule of Civil Procedure related to discovery[.]”

Judge’s Ruling

Judge Sorokin, in responding to the plaintiff’s accusations, stated: “These are serious accusations made in writing. They are without basis.”  Judge Sorokin also referenced a previous observation from his court where he “note[d] that there is no basis to infer improper discovery practices by defendant or anything other than reasonable forthright practices by [defense] counsel.”  Continuing, he noted:

“Indeed, to date, Plaintiff—rather than Defendants—has not conformed to the governing rules. She filed late discovery requests…which the Court ultimately found were almost entirely overbroad, unreasonable, and not proportional to the case…She induced the Court to issue an order by making a material misrepresentation: in writing, she represented that defense counsel had assented to an extension of the governing schedule which, the Court later learned, defense counsel had not.”

Judge Sorokin also outlined the plaintiff’s submission of documents produced by the defendants in a pending motion as “plainly designated as confidential” and “in direct violation of the protective order” that defendants had requested which was approved by the court, even though the plaintiff had “never challenged any confidentiality designations”.  Judge Sorokin indicated that filing “establishes a pattern of misconduct and disregard of the governing rules.”

As for the merits of the plaintiff’s motion to compel, Judge Sorokin addressed her five claims, as follows:

  • Format of the documents produced electronically by defendants: Judge Sorokin stated: “This challenge is without merit. Defendants produced the metadata both for documents and emails. As to emails, they searched their servers, and produced the relevant emails with attachments and metadata…This is a permissible practice.”
  • Defendants advanced improper general objections: Judge Sorokin stated: “Not so. Defendants augmented their ‘general’ objections with specific objections.”
  • Defendants withheld responsive non-privileged documents: Judge Sorokin stated that “nothing before the Court, contrary to Vaks’ arguments, suggests” that took place, noting that “Defendants produced multiple privilege logs” and indicated that the plaintiff “simply misunderstands” a reference from the defendants to imply there were suppressed documents.
  • Certain documents withheld by Defendants pursuant to the work product privilege doctrine were not privileged: Judge Sorokin stated: “This argument similarly fails”, noting that documents in contention were prepared at the direction of the defendant’s general counsel, “so that she could provide legal advice. In these circumstances, such documents are properly withheld.”
  • Reopen the now-completed Rule 30(b)(6) deposition: Judge Sorokin noted that there was “no basis” to do so, stating: “Indeed, Vaks has not demonstrated in any way that Mr. LeBlanc did not adequately answer questions during his deposition. Moreover, she did not, in any of the parties’ communications after Mr. LeBlanc’s deposition, claim that the deposition was deficient.”

In denying the motion, Judge Sorokin also stated: “One more issue bears comment. Vaks requests sanctions. None are merited here. Whatever the merits of Vaks’ claims—a matter upon which the Court has no view—defense counsel has discharged her discovery obligations well. She has made reasonable accommodations for a pro se party, as she must, while pressing her client’s positions firmly—all while under repeated attack. There is no basis whatsoever for the imposition of sanctions, nor even an arguable basis to request sanctions.”

So, what do you think?  Does the ruling open the door for the defendants to file their own motion for sanctions?  Please let us know if any comments you might have or if you’d like to know more about a particular topic.

Case opinion link courtesy of eDiscovery Assistant.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Here’s a Webcast on How to Win the Battle on Discovery Form of Production: eDiscovery Webcasts

Yesterday, I said that (despite the current COVID-19 crisis) CloudNine is continuing to provide the full range of services and high-quality support you have come to expect, including this blog.  And, webcasts too!  We’re back and better than ever with our next webcast – in just three weeks!

Let’s face it, one of the most common disputes in discovery today has to do with the form or forms of production for the electronically stored information (ESI) in the case. There are quite a few misconceptions regarding the different production forms as well as the pros and cons of each. So, what do you need to know to request the most appropriate form of production to maximize the information available to you, at a cost you can afford and a format that supports presentation activities such as depositions and trial exhibits?

Wednesday, April 8th at noon CST (1:00pm EST, 10:00am PST), CloudNine will conduct the webcast Winning the Battle on Discovery Form of Production. In this one-hour webcast that’s CLE-approved in selected states, we will cover current rules regarding form of production, options available to you, the pros and cons of each and relevant case law regarding recent form of production disputes. Topics include:

  • History Lesson: How We Got Here
  • Federal Rules Addressing Forms of Production
  • Options for Forms of Production
  • Objections to Native File Production and Counter-Arguments
  • Considerations for ESI Protocols
  • Key Recent Case Law Opinions Regarding Form of Production
  • Recommendations and Resources for More Information

As always, I’ll be presenting the webcast, along with Tom O’Connor.  To register for it, click here.  Even if you can’t make it, go ahead and register to get a link to the slides and to the recording of the webcast (if you want to check it out later).  If you want to learn how to win the battle on form of production disputes, this webcast is for you!

So, what do you think?  Do you feel like you understand how to select the form of production that is the most informative and most cost-effective for your cases?  If not, please join us!  And, as always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

The Ongoing Battle Over How ESI is Produced: eDiscovery Trends, Part Four

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems.  He has also been a great addition to our webinar program, participating with me on several recent webinars.  Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Mobile Collection: It’s Not Just for iPhones Anymore.  Now, Tom has written another terrific overview regarding mobile device collection titled The Ongoing Battle Over How ESI is Produced that we’re happy to share on the eDiscovery Daily blog.  Enjoy! – Doug

Tom’s overview is split into four parts, so we’ll cover each part separately.  The first part was last Tuesday, the second part was last Wednesday and the third part was last Friday, here’s the fourth and final part.

Conclusions

So, is all this controversy over ESI format legitimate? Or is it, in the words of Bob Eisenberg,

“ … a cocktail of the dubious, bogus and unfounded.  A stew of junk or half-baked technical science and disingenuous advocacy, seeking to rationalize the unreasonable, while tilting that proverbial playing field as far as possible in support of the defense …”.

You make the call.

Regardless, we’re certainly seeing more cases where form of production is figuring prominently in court rulings.  Here are some cases covered by eDiscovery Daily in just the past couple of years regarding form of production disputes, some which granted requests for native files and metadata, others which did not:

Finally, there is one terrific resource regarding form of production that everyone should read and it’s (once again) from renowned eDiscovery expert Craig Ball.  Craig’s Lawyer’s Guide to Forms of Production discusses all of the format options available to attorneys, the pros and cons of each, how to address considerations such as Bates numbers and redactions, and it even includes a sample Request for Production to help guide attorneys on requesting ESI.  Check it out!

So, what do you think?  Do you prefer image-based productions or native file productions?  As always, please share any comments you might have or if you’d like to know more about a particular topic.

Sponsor: This blog is sponsored by CloudNine, which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.