Electronic Discovery

Avoiding Glittering Generalities in Selecting eDiscovery Software: eDiscovery Best Practices

Editor’s Note: If you read our blog regularly, you know that we frequently reference my friend and CloudNine colleague Rob Robinson’s excellent blog, Complex Discovery for various industry information, including quarterly business confidence surveys, eDiscovery software and service market “mashups” and information about industry mergers and acquisitions (among other things).  We’ve been discussing aspects of on-premise and off-premise eDiscovery offerings quite a bit lately (including this recent webcast conducted by Tom O’Connor and me a few weeks ago) and Rob has written a terrific article on the subject which he has graciously allowed me to publish here.  This is the first part of his multi-part article – we will publish it in a series over the next couple of weeks or so.  Enjoy! – Doug

Forget the glittering generalities of opinioned providers and professionals trying to champion a particular approach to eDiscovery at the exclusion of others. The reality is that on-premise and off-premise solutions delivered as part of both emerging and mature technology implementations are and will continue to be a fundamental piece of any eDiscovery software portfolio if an organization wants to address the areas of security, capability, complexity, and cost comprehensively.

Considerations for the Selection of eDiscovery Software

One of the ongoing topics in the area of eDiscovery software revolves around assertions and attestations on what is the optimal delivery model for achieving the best balance of security, capability, complexity, and cost in an eDiscovery software offering. On one end of the spectrum, there are champions of the on-premise approach whose argument centers around security and capability and highlights that ability to deal with complex data sets is more important than how long the software has been on the market. On the other end of the spectrum, there are champions of the off-premise approach, also known as the cloud-enabled approach, whose argument centers around the speed and cost benefits of self-service discovery supported by the economics of a public cloud infrastructure. Between the ends of this spectrum reside a variety of offerings that combine attributes of both on-premise and off-premise offerings to deliver unique solutions.

So, how does one go about determining what might be the best offering to help them solve their on-going eDiscovery challenges? That is a great question and one without a single definitive answer. However, the following considerations may be helpful to eDiscovery professionals as they examine on-premise, off-premise, and combination software approaches with the goal of determining what the best-balanced solution might be for their needs.

Four Areas of Evaluation

Regardless of the type of delivery approach selected for the conduct of eDiscovery, there at least four attributes that should be considered in every solution selection. These attributes are:

  • Security: Does the solution provide the level of data protection needed for your eDiscovery effort?
  • Capability: Does the solution allow you to complete the basic tasks required for your eDiscovery effort?
  • Complexity: Does the solution allow you to complete advanced tasks required for your eDiscovery effort?
  • Cost: Does the solution address security, capability, and complexity in a cost-effective manner?

The ability to approach these attributes individually and collectively to find a solution that meets requirements, preferences, and budgets, ultimately determines whether an organization is successful from a legal, technological, and business perspective in the accomplishment of eDiscovery.  Next week, we will begin to touch on each of these areas of evaluation, beginning with a consideration of security.

So, what do you think?  What factors do you consider when evaluating and selecting eDiscovery software?  Please share any comments you might have or if you’d like to know more about a particular topic.

Also, I’m excited to report that eDiscovery Daily has been nominated to participate in The Expert Institute’s Best Legal Blog Contest in the Legal Tech category!  Thanks to whoever nominated us!  If you enjoy our blog, you can vote for it and help it win a spot in their Best Legal Blogs Hall of Fame.  You can cast a vote for the blog here.  Thanks!

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Opts for Lesser Sanction for Failure to Preserve Electronic Vehicle Data: eDiscovery Case Law

In Barry v. Big M Transportation, Inc., et al., No. 1:16-cv-00167-JEO (N.D. Ala. Sep. 11, 2017), Alabama Chief Magistrate Judge John E. Ott denied the plaintiffs’ request for default judgment sanctions for failing to preserve a tractor-trailer involved in an automobile accident and its “Electronic Data/Electronic Control Module (ECM) Vehicle Data Recorder/Black Box” and the data associated with the ECM device.  As an alternative sanction, Judge Ott indicated the intent to tell the jury that the ECM data was not preserved and to allow the parties to present evidence and argument at trial regarding the defendant’s failure to preserve the data.

Case Background

In this case arising out of a motor vehicle accident which was filed in Alabama state court and then removed to federal court, the plaintiffs sought to recover compensatory and punitive damages for their injuries and asserted claims against the trucking company and the driver of the truck.  Both defendants filed a motion for summary judgment on the plaintiffs’ claims and the plaintiffs filed a motion for partial summary judgment on the defendants’ affirmative defenses of contributory negligence, assumption of the risk, and intervening cause, as well as a “spoliation sanction” in the form of either a default judgment on the defendants’ negligence liability or an order judicially establishing certain facts against the defendants.

As a part of their motion for partial summary judgment, the plaintiffs requested a spoliation sanction against the defendants for their failure to preserve the tractor’s ECM data following the accident (or the tractor for that matter, which was sold), moving for either a default judgment on the defendants’ negligence liability or an order by the Court establishing “the speed [at] which {the driver} was driving and the maneuvers he made in the light most favorable” to the plaintiffs. In response, the defendants argued that the failure to preserve the ECM data was “well-reasoned and justifiable” and even if seen as not reasonable, didn’t warrant the imposition of sanctions. In addition, the driver defendant argued that he had no duty to preserve the tractor’s ECM data at the time of the accident or had any custody or control over the tractor following the accident.

Judge’s Ruling

In considering the request for sanctions, Judge Ott found that “Big M—but not Shaffer—is guilty of spoliation. Big M’s corporate representative, Benton Elliott, confirmed that it is Big M’s normal practice to retrieve the ECM data from a tractor if they know a collision is severe, and he admitted that there was nothing preventing Big M from preserving the ECM data in this instance.”

However, Judge Ott indicated that he was “unwilling to impose either of the severe sanctions requested by the Barrys for a number of reasons”, including 1) he was “not convinced that Big M acted with the intent to deprive the Barrys of the use of the ECM data”, that 2) “it was Big M’s impression that the Barrys were at fault for the accident”, that 3) “the Barrys have not been prejudiced to such an extent that the severe sanctions they have requested would be warranted” and 4) “the Barrys have not shown that Shaffer bears any responsibility for the loss of the ECM data.”

As a result, Judge Ott ruled that “the Barrys’ request for spoliation sanctions will be denied to the extent they have asked the Court to enter a default judgment on the Defendants’ negligence liability or, alternatively, to enter an order judicially establishing the speed at which Shaffer was driving and the maneuvers he made prior to impact in the light most favorable to the Barrys. However, as an alternative sanction, the Court intends to tell the jury that the ECM data was not preserved and will allow the parties to present evidence and argument at trial regarding Big M’s failure to preserve the data.”

So, what do you think?  Is that a sufficient sanction for failing to preserve the truck and the ECM data?  Please share any comments you might have or if you’d like to know more about a particular topic.

Also, I’m excited to report that eDiscovery Daily has been nominated to participate in The Expert Institute’s Best Legal Blog Contest in the Legal Tech category!  Thanks to whoever nominated us!  If you enjoy our blog, you can vote for it and help it win a spot in their Best Legal Blogs Hall of Fame.  You can cast a vote for the blog here.  Thanks!

Case opinion link courtesy of eDiscovery Assistant.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Want Some Tips on How to Prepare for the Rule 26(f) Meet and Confer? Join us Today!: eDiscovery Best Practices

Not only are the first days after a complaint is filed critical to managing the eDiscovery requirements of the case efficiently and cost-effectively, you need to do some prep even before the case is filed. With a scheduling order required within 120 days of the complaint and a Rule 26(f) “meet and confer” conference required at least 21 days before that, there’s a lot to do and a short time to do it. Where do you begin?  Find out today!

But first, I’m excited to report that eDiscovery Daily has been nominated to participate in The Expert Institute’s Best Legal Blog Contest in the Legal Tech category!  Thanks to whoever nominated us!  If you enjoy our blog, you can vote for it and help it win a spot in their Best Legal Blogs Hall of Fame.  You can cast a vote for our blog here.  Thanks!

Anyway, today at noon CST (1:00pm EST, 10:00am PST), CloudNine will conduct the webcast Holy ****, The Case is Filed! What Do I Do Now? (yes, that’s the actual title). In this one-hour webcast, we’ll take a look at the various issues to consider and decisions to be made to help you “get your ducks in a row” and successfully prepare for the Rule 26(f) “meet and confer” conference within the first 100 days after the case is filed. Topics include:

  • What You Should Consider Doing before a Case is Even Filed
  • Scoping the Discovery Effort
  • Identifying Employees Likely to Have Potentially Responsive ESI
  • Mapping Data within the Organization
  • Timing and Execution of the Litigation Hold
  • Handling of Inaccessible Data
  • Guidelines for Interviewing Custodians
  • Managing ESI Collection and Chain of Custody
  • Search Considerations and Preparation
  • Handling and Clawback of Privileged and Confidential Materials
  • Determining Required Format(s) for Production
  • Timing of Discovery Deliverables and Phased Discovery
  • Identifying eDiscovery Liaison and 30(b)(6) Witnesses
  • Available Resources and Checklists

I’ll be presenting the webcast, along with Tom O’Connor, who is now a Special Consultant to CloudNine!  If you follow our blog, you’re undoubtedly familiar with Tom as a leading eDiscovery thought leader (who we’ve interviewed several times over the years) and I’m excited to have Tom as a participant in this webcast!  To register for it, click here.  Even if you can’t make it today, go ahead and register to get a link to the slides and to the recording of the webcast (if you want to check it out later).

So, what do you think?  When a case is filed, do you have your eDiscovery “ducks in a row”?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Rule 502(d) Orders for Non-Waiver of Privilege: eDiscovery Best Practices

Tomorrow, Tom O’Connor and I will discuss the various issues to consider and decisions to be made to help you meet your discovery obligations in an efficient and proportional manner when preparing for the Rule 26(f) conference in the webcast Holy****, The Case is Filed! What Do I Do Now? (noon CT, click here to register for the webcast or to get a link to access the slides and video afterward).  One of the topics relates to an order you can file to avoid non-waiver of privilege for inadvertent disclosures (click here and here for recent examples of cases where information was inadvertent disclosed).  If you missed it before, let’s revisit the topic now.

A couple of years ago, LegalTech New York (LTNY) had several judges’ panel sessions that included several notable judges, including Judge Andrew J. Peck.  In each of those sessions, you heard this question from Judge Peck at one point during the session.

“How many of you use Federal Rule of Evidence 502(d) non-waiver orders?  Or, if you’re inside counsel, (how many) instruct your outside counsel to do so?”

For those who don’t know, here is the text of FRCP Rule 502(d): “Controlling Effect of a Court Order. A federal court may order that the privilege or protection is not waived by disclosure connected with the litigation pending before the court — in which event the disclosure is also not a waiver in any other federal or state proceeding.”

In one of the sessions, Judge Peck discussed the significance of Rule 502(d), as follows: “it is a rule that says you don’t have to be careful, you don’t have to show that you’ve done a careful privilege screening, and it says that if the court enters a 502(d) order, it’s a non-waiver of privilege in that case and it’s a non-waiver of privilege in any subsequent state or federal case, even with different parties.”

While making it clear that “I’m never saying that you shouldn’t be as careful as possible to protect your client’s privilege”, Judge Peck related a story of one case where a firm had a potentially privileged group of documents and the associate was reviewing the documents late at night, creating two piles – one for privileged, one for not privileged – got up to get a drink, came back and got the piles mixed up, resulting in privileged documents being inadvertently produced.  Naturally, he said, the other side “didn’t just let them off the hook” about whether that waived the privilege or not and there were motions back and forth about it, which a 502(d) order would have eliminated.

With regard to any potential downsides to filing a 502(d) order, Judge Peck made it clear that “in my mind, there is no downside to having such an order”, noting that the only downside he has heard is that “if you’re before the wrong judge, the famous Neanderthal judge that everyone worries about, that judge might say that you need to produce all your documents next week and you don’t need to do a privilege review.”  But, he dismissed that as unlikely and, noted that it is “against the rules”.

Judge Peck doesn’t just advocate use of 502(d) orders, he has provided a sample order on his page in the Southern District of New York web site, noting that “it’s a simple two paragraph order – the first paragraph gives you the 502(d) protection to the fullest extent and the second paragraph essentially says that nothing in this order will serve to prevent you from doing a careful review for privilege, confidentiality or anything else.”  He acknowledged that he “stole that paragraph from a lawyer presenting at the Georgetown conference a few years ago”.

Judge Peck also mentioned The Sedona Conference Commentary on the Protection of Privileged ESI (released three years ago, it can be downloaded here), which not only includes his sample order, but another (longer) example as well.

So, what do you think?  Do you use 502(d) orders in your cases?  If not, why not?  Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

When You Have a Lot of Custodians, Life Can Be a Batch: eDiscovery Best Practices

After Tom O’Connor and I hosted the webcast On Premise or Off Premise? A Look At Security Approaches to eDiscovery where we discussed the pros and cons of on premise and off premise (i.e., cloud) solutions last month (click here to check out the recording of it), I received a question from an attendee afterward, as follows: Isn’t another advantage of on premise solutions the ability to load large amounts of data from multiple custodians (i.e., multiple terabytes) to the eDiscovery platform?

Not necessarily.  For starters, not all cloud solution architectures are the same.  There are public cloud and private/protected cloud alternatives.  With a public cloud solution, the servers are controlled by the cloud provider (such as Amazon Web Services or Microsoft Azure), not by the eDiscovery provider.  Those servers could be located anywhere (even internationally), so loading data would typically be through File Transfer Protocol (FTP) or Secured File Transfer Protocol (SFTP) and would be reliant on your bandwidth and the bandwidth of the cloud provider.  Loading multiple terabytes to a public cloud solution could be extremely time consuming, perhaps excessively so.

In a private/protected cloud alternative, the servers are located in a data center controlled by the eDiscovery provider (and probably close by their offices).  To load multiple terabytes in that scenario doesn’t require FTP or SFTP, the provider can actually connect a drive provided by the client and copy the data up.  So, that is an alternative that can be essentially as fast as that of an on premise solution (because it is essentially on premise once the drive is received by the provider).

Does that mean it’s impossible to load large amounts of data to a cloud eDiscovery solution?  Not at all, if you effectively manage the data loading in multiple batches.  At CloudNine (shameless plug warning!), I can recall at least two recent clients within the past year or so that had a case with numerous (i.e., more than a hundred) custodians and those clients needed to get email stores (which had been exported out to Outlook PST files) loaded into our platform.  Because clients can load their own data (and because they didn’t check with us to see if there were faster alternatives), these two clients proceeded to load the data for their numerous custodians in multiple batches.  Because the load process is multi-threaded, they could have multiple batches going at once.

Each of the two collections was in excess of 3.5 terabytes (one was nearly 4 terabytes, at 3.92 TB), yet both clients were able to effectively get their data processed and loaded to get started on searching and review within their required time frame.

So, when considering eDiscovery solution alternatives that include cloud based solutions, it’s important to understand which are public cloud solutions and which are private/protected cloud solutions and what that means to you.  It’s also important to understand how data can be processed and loaded and whether the load process is multi-threaded.  And, it’s important to understand the pros and cons of on premise and off premise solutions to help you decide (Tom and I covered both in the webcast linked to at the top of the post).  Depending on your requirements, a combination of both on premise and off premise may be appropriate to meet your needs.

So, what do you think?  Do you use on-premise, off-premise or a combination for your eDiscovery solution(s)? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Court Adds Some of the Custodians Requested by Plaintiffs to Discovery, But Not All: eDiscovery Case Law

In Mann, et al. v. City of Chicago, et al, Nos. 15 CV 9197, 13 CV 4531 (N.D. Ill. Sep. 8, 2017), Illinois Magistrate Judge Mary M. Rowland granted in part and denied in part the plaintiffs’ Motion to Compel the defendant to include certain custodians in their email search, ordering the defendant to search emails of five additional custodians (including the Mayor of Chicago), but not requiring the defendant to search emails for an additional three custodians requested by the plaintiff.  Judge Rowland also denied the plaintiffs’ request for sanctions, finding that the defendant’s conduct was not sanctionable.

Case Background

In this consolidated case involving alleged unconstitutional Chicago police (CPD) practices at “off the grid” facilities (including one known as “Homan Square”), the parties agreed on several discovery related items, including search terms and the majority of custodians.  The parties also agree that discovery would include the Mayor’s Office, but “reached an impasse” on which custodians in the Mayor’s Office should be searched, with the plaintiffs’ arguing that Mayor Emanuel and ten members of his senior staff were relevant to the plaintiffs’ Monell claim.  In response, the defendant argued that the plaintiffs’ request was burdensome, and that the plaintiffs “have failed to provide any grounds to believe that the proposed custodians were involved with CPD’s policies and practices at Homan Square”, proposing instead that it search the two members of the Mayor’s staff responsible for liasoning with the CPD and leave “the door open for additional custodians” depending on the results of that search.

Judge’s Ruling

With regard to the parties’ dispute over whether the Mayor was a “policymaker” for the City with regard to the use of the Homan Square facility, Judge Rowland stated: “On summary judgment or at trial, Plaintiffs will have to provide evidence that ‘the unlawful practice was so pervasive that acquiescence on the part of policymakers was apparent and amounted to a policy decision’ or that a policymaking official responsible for final government policy on the police practices at issue directed the particular conduct that caused Plaintiffs’ harm…But at this stage Plaintiffs do not have to establish that the Mayor was a policymaker or had final authority on the police practices at issue or that there is a ‘nexus’ between the custodians of the emails and CPD’s alleged activities at Homan Square.”

Judge Rowland also noted that the defendant had identified the two custodians “as the most likely holders of responsive emails…But in light of the allegations in the complaint, the Mayor and his upper level staff also might have responsive emails.”  She also rejected the defendant’s argument that the additional custodians would be burdensome, noting that “[t]he City does not offer any specifics or even a rough estimate about the burden.”

As a result, Judge Rowland ordered the defendant to search emails of five additional custodians (including the Mayor of Chicago), but did not require the defendant to search emails for an additional four custodians requested by the plaintiff “because of the short tenure of the staff person or the time during which the person held the position”.  She also denied the plaintiffs’ request for sanctions against the defendant, stating: “The Court does not view the City’s conduct as sanctionable and both parties’ diligent efforts to work together shows that ‘other circumstances make an award of expenses unjust.’”

So, what do you think?  Might the defendant have had a better result if it had provided at least an estimate of the burden?  Please share any comments you might have or if you’d like to know more about a particular topic.

Case opinion link courtesy of eDiscovery Assistant.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

To No One’s Surprise, Worldwide Spending on Cybersecurity is Up: Cybersecurity Trends

Can you guess what the global spend on cybersecurity will be this year?  Gartner recently provided a forecast, see how close you can come to guessing the amount.  The answer is at the bottom of this post – the picture of this well-known astronomer should provide some clue.

In their press release from August announcing the forecast and report (I would quote the title, but that would give away the answer), Gartner forecasted fast growth in the security testing market (albeit from a small base) due to continued data breaches and growing demands for application security testing as part of DevOps. Spending on emerging application security testing tools, particularly interactive application security testing (IAST), will contribute to the growth of this segment through 2021.  So, if you want to get into a career growth area, security testing sounds like a good one.

Gartner says that security services will continue to be the fastest growing segment, especially IT outsourcing, consulting and implementation services. However, hardware support services will see growth slowing, due to the adoption of virtual appliances, public cloud and software as a service (SaaS) editions of security solutions, which reduces the need for attached hardware support overall.

Another factor that will lead to increases in security spend, according to Gartner: The EU General Data Protection Regulation (GDPR) has created renewed interest, and will drive 65 percent of data loss prevention buying decisions today through 2018 (not to mention some eDiscovery buying decisions too).  And, if you don’t think your firm or organization is subject to GDPR, you may want to read this.

However, by 2021, Gartner reports that more than 80 percent of large businesses in China will deploy network security equipment from a local vendor.  China’s recently approved cybersecurity law will contribute to further displacement of U.S.-manufactured network security products with local Chinese vendors. Despite an increase of 24 percent in 2016, Gartner expects end-user spending growth in Asia/Pacific to return to single-digit yearly growth from 2018 onward, as a result of a decline in average selling prices (ASPs), due to the more competitive pricing of Chinese solutions.

So, how big is the global cybersecurity market?  According to Gartner, worldwide spending on information security products and services will reach $86.4 billion in 2017, an increase of 7 percent over 2016, with spending expected to grow to $93 billion in 2018.  In other words, “billions and billions” as famous astronomer Carl Sagan was known to say.

More detailed analysis is available to Gartner clients in these two reports: Forecast Analysis: Information Security, Worldwide, 1Q17 Update and It’s Time to Align Your Vulnerability Management Priorities With the Biggest Threats.

So, what do you think?  Has your organization increased spending on cybersecurity products and services? Please share any comments you might have or if you’d like to know more about a particular topic.

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.

Lucky Seven! eDiscovery Daily is Seven Years Old!

Believe it or not, it has been seven years ago today since we launched the eDiscovery Daily blog!

We launched seven years ago on September 20, 2010.  Back then, we told you to not get “wild” with wildcards and published our first case law post about a case where the spoliator of data was actually threatened with jail time –  our first of 575 posts about case law to date, covering more than 400 distinct cases!  We’ve published over 1,800 lifetime posts, and every post is still available on the site for your reference.

As always, we have you to thank for all of that success!  Thanks for making the eDiscovery Daily blog a regular resource for your eDiscovery news and analysis!  We really appreciate the support!

As many of you know by now, we like to take a look back every six months at some of the important stories and topics during that time.  So, here are some posts over the last six months you may have missed.  Enjoy!

When you are ordered to provide “five detailed search terms” to the court, providing 72 spelling variations on those terms might be a bit much.

Oh, and if you put information on a file share site without a password, you might have waived privilege.

Ten years later, The Sedona Principles are new and improved.

In a divorce case, metadata can thwart your efforts to forge signed agreements with your spouse.

And, if you try boilerplate objections with this judge again, EXPECT SANCTIONS.

This guy says that failing to preserve mobile devices in litigation is malpractice.

Believe it or not, the Internet is even busier than last year.

If you want to murder your wife, her Fitbit could prove your undoing.

In this case, SCOTUS weighed in on fee awards for discovery misconduct.

Should you perform keyword search before TAR?  This court says no.

Should Rule 37(e) apply when a party intentionally deletes ESI?  This court says no.

Should courts specify search terms for parties to use?  This court says yes – for the second time.

Is pricing transparency finally happening in eDiscovery?  You decide.

Can producing in native format be burdensome?  And, will a court agree?

Did you know over 80% of hacking related breaches are related to password issues?  Well, no wonder, this retired NIST expert says his advice on creating passwords was wrong.

If your data is in the cloud, it is likely still within your “possession, custody, or control” for litigation purposes.

Are organizations more likely to use an on-premises solution than a cloud-based solution?  Here are the results of one survey.

As an eDiscovery provider, here’s how I might have avoided the Wells Fargo inadvertent disclosure.

This social media request by the defendant is reasonably calculated to illustrate the defendant’s lack of knowledge on the current rules.

Even large government entities can make the most fundamental mistakes when it comes to applying redactions.

This is just a sampling of topics that we’ve covered.  Hope you enjoyed them!

Thanks for the interest you’ve shown in the topics!  We will do our best to continue to provide interesting and useful eDiscovery news and analysis.  And, as always, please share any comments you might have or if you’d like to know more about a particular topic!  On to 8 years and 2,000 lifetime posts!  :o)

Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by CloudNine. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Daily should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.