Our Insights on eDiscovery

Read on to learn more about the latest trends and insights in the world of digital discovery.
Over 80 Percent of Hacking Related Breaches Were Related to Password Issues: Cybersecurity Trends
Over 80 Percent of Hacking Related Breaches Were Related to Password Issues: Cybersecurity Trends 341 341 CloudNine

I’ve referred to last year’s Verizon Data Breach Investigations Report (DBIR) in several webcasts lately (including this one) and realized that this year’s report should have already come out by now. Sure enough it has, about a month and a half ago. Let’s see what the findings are.

read more
Here’s an Opportunity to Learn How to Fix “Pitfalls” and “Potholes” in Your eDiscovery Project: eDiscovery Best Practices
Here’s an Opportunity to Learn How to Fix “Pitfalls” and “Potholes” in Your eDiscovery Project: eDiscovery Best Practices 310 465 CloudNine

If you’ve ever managed a discovery project for litigation, investigations or audits, you know that “Murphy’s Law” dictates that a number of “pitfalls” and “potholes” can (and will) occur that can derail your project. Thanks to our friends at ACEDS, you can learn more about these “pitfalls” and “potholes” that you can encounter during the discovery life cycle from Information Governance to Production and how to address them to keep your discovery project on track.

read more
Court Denies Defendant’s Motion to Overrule Plaintiff’s Objections to Discovery Requests
Court Grants Summary Judgment After Plaintiff’s Spoliation Motion Denied: eDiscovery Case Law
Court Grants Summary Judgment After Plaintiff’s Spoliation Motion Denied: eDiscovery Case Law 479 270 CloudNine

In Taylor v. Thrifty Payless, Inc., d/b/a Rite-Aid, Oregon District Judge Marco A. Hernandez granted the defendant’s motion for summary judgment after denying the plaintiff’s request for spoliation sanctions against the defendant for failing to preserve store videos that were taken on the day of her slip and fall in the defendant’s store.

read more
If You’re a Small Firm, Learn Here Why There Has Never Been a Better Time to Embrace eDiscovery: eDiscovery Trends
If You’re a Small Firm, Learn Here Why There Has Never Been a Better Time to Embrace eDiscovery: eDiscovery Trends 368 208 CloudNine

Until recently, state of the art eDiscovery technology was only available to the largest law firms and corporations. Smaller firms and organizations were essentially priced out of the market and couldn’t afford the solutions that could be used by the “big boys” to manage their discovery workloads. Times have changed – thanks to cloud-based, software-as-a-service (“SaaS”) automated solutions that have made full-featured eDiscovery solutions affordable for even small and solo firms. What do you need to do to take advantage of that? Find out here.

read more
The “Belt and Suspenders” Approach for Effective Communication: eDiscovery Best Practices
The “Belt and Suspenders” Approach for Effective Communication: eDiscovery Best Practices 437 377 CloudNine

To be a good manager, you need to be a good communicator. It is so easy for miscommunications to occur that can derail your project and cause deadlines to be missed, or work product to be incomplete or not meet the client’s expectations. To avoid those (and to cover your behind if miscommunications do occur), use the “belt and suspenders” approach to communication.

read more
Court Denies Defendant’s Motion to Overrule Plaintiff’s Objections to Discovery Requests
Despite Parties’ “Significant Animosity”, Court Orders Them to Meet and Confer: eDiscovery Case Law
Despite Parties’ “Significant Animosity”, Court Orders Them to Meet and Confer: eDiscovery Case Law 479 270 CloudNine

In Elhannon LLC v. F.A. Bartlett Tree Expert Co., Vermont District Judge William K. Sessions, III granted in part and denied in part the plaintiff’s renewed motion to compel, denied motions for sanction by each party against the other, and ordered the parties to engage in further meet-and-confer efforts to narrow their differences on the appropriate scope of discovery.

read more
To Keyword Cull or Not to Keyword Cull? That is the Question: eDiscovery Trends
To Keyword Cull or Not to Keyword Cull? That is the Question: eDiscovery Trends 341 338 CloudNine

We’re seeing a lot of discussion about whether to perform keyword searching before predictive coding. We’ve even seen a recent case where a judge weighed in as to whether TAR with or without keyword searching is preferable. Now, we have a new article published in the Richmond Journal of Law and Technology that weighs in as well.

read more
Are Investment Activities Slowing Down in eDiscovery?: eDiscovery Trends
Are Investment Activities Slowing Down in eDiscovery?: eDiscovery Trends 403 539 CloudNine

Are investment activities slowing down in eDiscovery? And, why is there a cute kid on my blog post today? Read about both here.

read more
Court Denies Defendant’s Motion to Overrule Plaintiff’s Objections to Discovery Requests
Google Again Ordered to Produce Internationally Stored Data: eDiscovery Case Law
Google Again Ordered to Produce Internationally Stored Data: eDiscovery Case Law 479 270 CloudNine

In the case In re: Search of Content that is Stored at Premises Controlled by Google, California Magistrate Judge Laurel Beeler, noting that the “SCA regulates disclosure of data in a service provider’s possession” ordered Google to “produce all content responsive to the search warrant that is retrievable from the United States, regardless of the data’s actual location”.

read more
Want to Find Malware in Your Network Sooner? Listen to Your Network: Cybersecurity Best Practices
Want to Find Malware in Your Network Sooner? Listen to Your Network: Cybersecurity Best Practices 692 465 CloudNine

One of the most telling statistics about cybersecurity and data breaches that we covered during Wednesday’s webcast was from last year’s Verizon Data Breach Incident Report which said that almost 93 percent of breach compromise incidents occur within minutes, with 11 percent of those occurring within seconds. But, less than 25 percent of those breaches are discovered within days. Maybe your network traffic holds the key to detecting malware sooner.

read more