This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Reflecting on the Wannacry ransomware attack, which is the lesson learnt e why most organizations are still ignoring it. The dropper, once copied on the computer, attempted to connect to a site and only if the connection failed, proceeded to install two components, a cryptolocker and an exploit.
Craig Ball once made a great point in responding to a post of mine about educating lawyers when he said “ We not only need to persuade lawyers to take the plunge, we need to insure there’s a pool for them to jump into. Do they go to a community night course on computers? Pursue online education? Pursue online education?
As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). Hey, judges! This might be a good place to start! Remember, it’s for a great cause.
But, perhaps the best answer to this question lies in Craig Ball’s new primer – Processing in E-Discovery. In the Introduction, Craig says this: “Talk to lawyers about e?discovery discovery processing and you’ll likely get a blank stare suggesting no clue what you’re talking about. But I’m getting ahead of myself.
discovery obligations, but also understand the methodologies and technologies associated with managing eDiscovery. William Hamilton, legal skills professor and executive director of the University of Florida’s E-Discovery Project, led the course, which took place at Southeast University during the last two weeks of August.
Actually, it started yesterday, with a few events, including the Welcome Reception and the Beer and Basics: e-Discovery 101 and Relativity Fundamentals session (serving beer and wine at an education session is OK with me!). PD189198 – Making the Team: How One Law Firm Supercharged e-Discovery.
E-discovery luminary and recipient of the Masters Conference Educator of the Year 2016, Mary provides ACEDS and its membership more than a decade of strong credibility and sound leadership within the e-discovery community. Mary is Executive Director of the Association of Certified eDiscovery Specialists (ACEDS).
See what I did there? ; o ) While I’m speaking at the University of Florida E-Discovery Conference today, let’s take a look at a couple of articles related to Internet of Things (IoT) devices that you need to know from an eDiscovery standpoint. What are the types of evidence out there? We need to know to win in this environment.”.
The EDRM has been a household name in the e-discovery and legal technology industry for 15 years. Join this lively and interactive session for a discussion about evolving standards and workflows in e-discovery and how they might be incorporated into a revised EDRM.
In discussing this new capability, Craig states: “This is a leap forward for all obliged to place a litigation hold on the contents of Android phones — a process heretofore unreasonably expensive and insufficiently scalable for e-discovery workflows. Are you struggling with mobile device discovery? Everything old is new again.”.
When I spoke at the University of Florida E-Discovery Conference last month, there was a question from the live stream audience about a lawyer’s duty to disclose a data breach within his or her law firm. Please remove all laptops from docking stations & keep turned off. *No No exceptions*. And, Model Rule 1.4
Despite that, as the opinion noted, Schulton had previously acknowledged that he used a “mechanism called Take Out” to export his entire ScholarChip e-mail account, which included all of its contents dating back to 2014, to Schulton’s personal “One Drive” cloud storage account. Judge’s Ruling.
Throughout the case, the plaintiff claimed that the evidence needed to prove the case existed in emails stored on UBS’ own computer systems. That case and the subsequent rule changes effectively forced civil litigants into a compliance mode with respect to their proper retention and management of electronically stored information (ESI).
Shark Week on the Discovery Channel concludes this weekend, which means Case Week on the eDiscovery Channel (a.k.a., As a result, the defendant filed a motion, asserting that the plaintiff was duplicitous about the Facebook discovery in question and requested case dismissal. Judge’s Ruling.
To begin to answer that question, let’s take a look at the ethical obligation that lawyers have to be technically competent and the state of technology education for lawyers today. which requires every discovery disclosure, request, response or objection be signed by an attorney of record. How Can We Change the Situation? In Mancia v.
One of the plaintiff’s alleged harassers left the company a mere two days after that, but his computer was wiped within 7 days of his last day at work. Noting that the “failure to preserve electronic evidence is covered by Fed.R.Civ.P. Noting that the “failure to preserve electronic evidence is covered by Fed.R.Civ.P.
Information such as name, title, e-mail address, phone number, office location and where information for each is stored on the network is important to be able to proceed quickly when issuing hold notices and collecting their data. Here are several of the key early activities that can assist in deciding whether to litigate or settle the case.
In Michael E. Electronic Arts, Inc., Three former NFL players claimed that Electronic Arts (EA) used their likenesses in the Madden NFL videogame series without authorization. Davis, et al. 10-cv-03328-RS, (N.D. April 3, 2018) , California Magistrate Judge Donna M. ” Case Background. ” Case Background.
Myers (whose testimony the Court deemed credible and persuasive), found that each of the three computers he reviewed contained anti-forensic software (Advanced Mac Cleaner and CleanMyMac). The PHP Defendants’ Use of Anti-Forensic Software: The plaintiffs’ forensic expert, John T.
Like me, several of you are fans of Rob Robinson’s quarterly eDiscovery Business Confidence Survey on his Complex Discovery blog and he has just published the results of his Spring 2019 Survey , which are very interesting and I will (hopefully) post my normal analysis on that tomorrow. This is one of those weeks. In Craig’s post, Mueller?
In assessing the plaintiff’s motion, Judge O’Hara noted that “the parties agreed the surveillance video is a form of electronically stored information (“ESI”) subject to the preservation requirements of Rule 37(e)”. Case Background. I love you! Case opinion link courtesy of eDiscovery Assistant.
Here are the remaining fifteen cases related to spoliation and sanctions below: Court Says Rule 37(e) Doesn’t Apply When Recording Was Intentionally Deleted : In Hsueh v. Court Grants Lesser Sanctions Against Defendant for Various Discovery Issues : In New Mexico Oncology v. Alabama Chief Magistrate Judge John E. Holdings, Inc.
In this litigation involving the performance of Apple devices after software updates, the Special Discovery Master entered an order authorizing the forensic imaging of the devices belonging to 10 of the more than 90 named Plaintiffs in order to allow Apple’s outside experts to performance test the devices. In the case In Re: Apple Inc.,
Sponsor: This blog is sponsored by CloudNine , which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. In an unusually long blog post for Craig’s blog (dare I say a “Losey-ian” length blog post?),
In discussing this new capability, Craig states: “This is a leap forward for all obliged to place a litigation hold on the contents of Android phones — a process heretofore unreasonably expensive and insufficiently scalable for e-discovery workflows. Are you struggling with mobile device discovery? Everything old is new again.”.
Sweet, among other rulings, issued an adverse inference sanction against one of the defendants for its failure to preserve text messages in the possession of a non-party, finding that defendant had control of the non-party’s text messages, given that he was contracted by the defendant and provided documents and gave a deposition during discovery.
Davis showed the audience a slide quoting Andrew Ng, a computer scientist and professor at Stanford University: “If a typical person can do a mental task with less than one second of thought, we can probably automate it using AI either now or in the near future.” Davis, a partner with Hinshaw & Culbertson LLP in New York.
As I noted yesterday , the Women in eDiscovery (WiE), Houston Chapter, in partnership with South Texas College of Law and the Association of Certified E-Discovery Specialists (ACEDS), hosted the second annual “Legal Technology Showcase & Conference” yesterday. But I did attend the other sessions.
The Ernie Challenge posited a case with roughly 1 terabyte of data to collect and a final amount of 200 gigabytes of data to review, most of that e-mail with the balance being various types of financial data. Discovery Cloud: discoverycloud.nextpoint.com. By 2012, the products Craig Ball mentioned had materialized.
Most people would begin the discussion by agreeing with this framing statement made by Maura Grossman and Gordon Cormack in their seminal article, Technology-Assisted Review in E-Discovery Can Be More Effective and More Efficient Than Exhaustive Manual Review , (XVII RICH. & TECH. In short, analytics are the individual tools.
Since the 2015 Federal Rules changes and changes to Rule 26(b)(1) regarding the scope of discovery, we’re seeing more disputes regarding proportionality vs. relevancy vs. privacy than ever. Discovery Can’t Be Stayed While Motion to Dismiss is Considered, Court Says : In Udeen v. PROPORTIONALITY vs. RELEVANCY vs. PRIVACY. Kiewit Corp.
where he is a Principal and the firm’s National e-Discovery Counsel. You have to deal more with text messages, because the employees aren’t going to use their e-mail. Honestly, I’m kind of lazy – all good computer people are a little bit lazy, which is what drives process improvement.
Discovery “Cautionary Tale” Leads to Recommendations of Default Judgment Against Defendants : In Abbott Laboratories, et al. Sponsor: This blog is sponsored by CloudNine , which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation.
Quite frankly, in those conferences in many cases, you have sessions that are more educational and less advertising. So, a lot of people are choosing to go to Relativity Fest or Ipro’s user conference or forensics conferences or ILTA, which has great educational content. But, my first priority would be better educational content.
Mayhem is deployed and already helping the DoD in DevSecOps, for T&E (Test and Evaluation) , and cybersecurity teams make the world safer. I didn’t even have to turn off my electronics during takeoff! Mayhem had three key components: Discovery. The B2 bomber. Special operations command. The national security agency.
Mayhem is deployed and already helping the DoD in DevSecOps, for T&E (Test and Evaluation) , and cybersecurity teams make the world safer. I didn’t even have to turn off my electronics during takeoff! Mayhem had three key components: Discovery. The B2 bomber. Special operations command. The national security agency.
Mayhem is deployed and already helping the DoD in DevSecOps, for T&E (Test and Evaluation) , and cybersecurity teams make the world safer. I didn’t even have to turn off my electronics during takeoff! Mayhem had three key components: Discovery. The B2 bomber. Special operations command. The national security agency.
Galperin is the current Director of Cybersecurity at the Electronic Frontier Foundation (EFF) and noted free speech advocate. Currently CEO of Bit Discovery, Grossman is an innovative industry leader. Markstedter actively contributes to filling the infosec education gap. October is now BGP Awareness Month. Street @jaysonstreet.
A frequent court appointed special master in electronic evidence, Craig is a prolific contributor to continuing legal and professional education programs throughout the United States, having delivered over 2,000 presentations and papers. Just take the e-mail instead. This is not that day. Margins collapse. Social networking.
Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. NON-PARTY DISCOVERY. Here are six cases last year where courts decided on non-party discovery requests: Court Denies Non-Party’s Request to Quash Subpoena in Telecommunications Dispute : In Fair v.
Topics E-mail , Collaboration , Groupware , Online Communications , Enterprise Software , Software , Oliver Marks Blogger Info Oliver Marks Bio Contact Biography Oliver Marks Oliver Marks provides seasoned independent consulting guidance to companies on the effective planning of Enterprise 2.0 The goal of course was to tell [.]
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content