About
Services
Articles & Resources
Contact
✕
May 6, 2022
May 6, 2022
8 Ways to Reduce Data for Large Document Reviews
Eight techniques and strategies that we use to reduce data collections to manageable sizes for efficient document reviews.
March 10, 2022
March 10, 2022
What is ECA (Early Case Assessment) and Why is it Important?
Early case assessment (ECA) provides an opportunity to understand evidence and also presents opportunities for fact finding and cost savings.
November 24, 2021
November 24, 2021
The Legal Ethics of Cloud Computing & SaaS
Use of the cloud and SaaS implicates legal ethics rules requiring protection of client confidences and due diligence into third parties.
September 22, 2021
September 22, 2021
Does an Employer Have a Duty to Preserve an Employee’s Personal Cloud Storage
Depending on the court, a duty to preserve data in employees' personal cloud may arise if the employer has "practical ability" to access it.
September 8, 2021
September 8, 2021
Employee Theft Investigation: a Digital Forensics Case Study
An overview of the investigation techniques our digital forensics team used to uncover employee data theft of sensitive customer information.
August 31, 2021
August 31, 2021
Do Email Messages Have to Be Produced With Attachments in Litigation?
There is no hard and fast rule. But, there are a few legal arguments to support producing email messages with attachments.
August 26, 2021
August 26, 2021
When Must Litigant Provide Computer to Opponent for Examination?
Compelling a forensic examination of a computer hard drive generally requires a showing of discovery misconduct by the device owner.
August 18, 2021
August 18, 2021
The Sedona Conference Weighs in on Ephemeral Messaging
The Sedona Conference examines legal and regulatory issues presented by ephemeral messaging, the benefits and risks of using the messaging apps, and offers a policy framework for both businesses and courts.
August 1, 2021
August 1, 2021
What is a Computer File’s Hash Value?
ESI and electronic files have a "hash value" (a string of alphanumeric characters) used to identify duplicates and confirm authenticity.
Load more