May 6, 2022

8 Ways to Reduce Data for Large Document Reviews

Eight techniques and strategies that we use to reduce data collections to manageable sizes for efficient document reviews.
March 10, 2022

What is ECA (Early Case Assessment) and Why is it Important?

Early case assessment (ECA) provides an opportunity to understand evidence and also presents opportunities for fact finding and cost savings.
November 24, 2021

The Legal Ethics of Cloud Computing & SaaS

Use of the cloud and SaaS implicates legal ethics rules requiring protection of client confidences and due diligence into third parties.
September 22, 2021

Does an Employer Have a Duty to Preserve an Employee’s Personal Cloud Storage

Depending on the court, a duty to preserve data in employees' personal cloud may arise if the employer has "practical ability" to access it.
September 8, 2021

Employee Theft Investigation: a Digital Forensics Case Study

An overview of the investigation techniques our digital forensics team used to uncover employee data theft of sensitive customer information.
August 31, 2021

Do Email Messages Have to Be Produced With Attachments in Litigation?

There is no hard and fast rule. But, there are a few legal arguments to support producing email messages with attachments.
August 26, 2021

When Must Litigant Provide Computer to Opponent for Examination?

Compelling a forensic examination of a computer hard drive generally requires a showing of discovery misconduct by the device owner.
August 18, 2021

The Sedona Conference Weighs in on Ephemeral Messaging

The Sedona Conference examines legal and regulatory issues presented by ephemeral messaging, the benefits and risks of using the messaging apps, and offers a policy framework for both businesses and courts.
August 1, 2021

What is a Computer File’s Hash Value?

ESI and electronic files have a "hash value" (a string of alphanumeric characters) used to identify duplicates and confirm authenticity.