Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.
Symantec eDiscovery Blog
Showing posts tagged with electronic data discovery
Showing posts in English
Matthew Nelson | 30 Oct 2013 | 0 comments

Readers may recall last year’s expensive battle over the use of predictive coding technology in the 7th Circuit’s Kleen Products case. Although the battle was temporarily resolved in Defendants’ favor (they were not required to redo their production using predictive coding or other “Content Based Advanced Analytics” software), a new eDiscovery battle has surfaced this year between Plaintiffs and a non-party, The Levin Group (“TLG”).

In Kleen, Plaintiffs allege anticompetitive and collusive conduct by a...

Matthew Nelson | 30 Sep 2013 | 0 comments

One of the hottest information technology (IT) trends is to move data once stored within the corporate firewall into a hosted cloud environment managed by third-party providers. In 2013 alone, the public cloud services market is forecast to grow an astonishing 18.5 percent to $131 billion worldwide, up from $111 billion in 2012. The trend is driven largely by the fact that labor, infrastructure, and software costs can be reduced by sending email and other data to third-party providers for off-site hosting. Although the benefits of cloud computing are real, many organizations make the decision to move to the cloud without thoroughly weighing all the risks and benefits first.

A common problem is that many corporate IT departments fail to consult with...

Matthew Nelson | 07 Aug 2013 | 0 comments

Confusion about establishing a legally defensible approach for collecting data from computer hard drives during eDiscovery has existed for years. The confusion stems largely from the fact that traditional methodologies die hard and legal requirements are often misunderstood. The most traditional approach to data collection entails making forensic copies or mirror images of every custodian hard drive that may be relevant to a particular matter. This practice is still commonly followed because many believe collecting every shred of potentially relevant data from a custodian’s computer is the most efficient approach to data collection and the best way to avoid spoliation...

pfavro | 24 Jul 2013 | 0 comments

Various theories have been advanced over the years to determine why the digital age has caused the discovery process to spiral out of control. Many believe that the sheer volume of ESI has led to the increased costs and delays that now characterize eDiscovery. Others place the blame on the quixotic advocacy of certain lawyers who seek “any and all...

pfavro | 09 Jul 2013 | 1 comment

You have probably heard the news. Changes are in the works for the Federal Rules of Civil Procedure that govern the discovery process. Approved for public comment last month by the Standing Committee on Rules of Practice and Procedure, the proposed amendments are generally designed to streamline discovery, encourage cooperative advocacy among litigants and eliminate gamesmanship. The amendments also try to tackle the continuing problems associated with the preservation of electronically stored information (ESI). As a result, a...

Matthew Nelson | 12 Jun 2013 | 0 comments

This week marks the release of the 3rd annual Gartner Magic Quadrant for e-Discovery Software report.  In the early days of eDiscovery, most companies outsourced almost every sizeable project to vendors and law firms so eDiscovery software was barely a blip on the radar screen for technology analysts. Fast forward a few years to an era of explosive information growth and rising eDiscovery costs and the landscape has changed significantly. Today, much of the outsourced eDiscovery “services” business has been replaced by eDiscovery software solutions that organizations bring in house to...

pfavro | 10 May 2013 | 0 comments

Apple obtained a narrow discovery victory yesterday in its long running legal battle against fellow technology titan Samsung. In Apple Inc. v. Samsung Electronics Co. Ltd, the court ordered non-party Google to turn over the search terms and custodians that it used to produce documents in response to an Apple subpoena.

According to the court’s order, Apple argued for the production of Google’s search terms and custodians in order “to know how Google created the universe from which it produced documents.” The court noted that Apple sought such information “to evaluate the adequacy of Google’s search, and if it finds that search...

Matthew Nelson | 12 Apr 2013 | 4 comments

In Part One of “How Good is Your Predictive Coding Poker Face?” we shared video footage of Maura R. Grossman, Craig Ball, Ralph C. Losey and myself (Matthew Nelson) discussing similarities between predictive coding technology and the popular poker game ...

AlliWalt | 19 Mar 2013 | 2 comments

On a recent trip to South Africa, where Symantec sponsored an event with PricewaterhouseCoopers (PwC) entitled The Protection of Personal Information (POPI) Drives Information Governance, customers and partners shared important insights. One major concern the attendees had was how they will comply with the newly proposed privacy legislation set to pass any day now.

POPI is the first comprehensive body of law addressing privacy in the country. Personal data is defined as a natural person’s name, date of birth, national identification number, passport number, health or credit information and other personally identifiable...

pfavro | 07 Mar 2013 | 3 comments

At eDiscovery 2.0, we have consistently followed the reports that Gibson Dunn has released on the state of eDiscovery. This is for good reason given its reputation as an excellent source of information on the trends affecting individual organizations and the industry as a whole.

The recently released 2012 annual report is no different, except that the overall tone is more positive. Instead of spotlighting the continuing problem of sanctions, the report showcases...