Explore
Trending: Social Media in eDiscovery

As social media has been working its way ever deeper into our relationships, professional activities, and culture, its impact on discovery has been growing as well. Unfortunately, the nature, diversity, and volume of social media data continue to present a variety of technical and legal challenges for practitioners. So, we are revisiting this topic – one of our most popular of last year – updated with new usage data, new revelations about available ESI, new rule amendments and cases, and more.

Read More

Mobile Devices Wrap-Up – Mobile Device Discovery Series, Part 6

When considered together, the twelve cases we reviewed suggest a few key points to remember regarding mobile devices in eDiscovery: the fact that mobile devices are a novel or challenging source is no excuse to skip them; there will be potentially serious consequences for inadvertent losses from mobile devices, and there will be very serious consequences for intentional spoliation of mobile device data; and, it may be possible to establish the prior existence of lost text messages using phone records from the relevant wireless carrier. Read on to review the three other main key points from the case law as well as the key takeaways from our review of mobile devices in eDiscovery.

Read More

Even More Mobile Devices Cases – Mobile Device Discovery Series, Part 5

In this case law survey, we are briefly reviewing a dozen cases from across the past five years that have touched on mobile device discovery issues.  We are reviewing them in chronological order: Stinson v. City of New York, No. 10 Civ. 4228 (S.D.N.Y. Jan. 2, 2016), NuVasive, Inc. v. Madsen Med. Inc., No. 13cv2077 BTM(RBB) (S.D. Cal. Jan. 26, 2016), First Financial Security., Inc. v. Lee, No. 14-1843 (D. Minn. Mar. 8, 2016), Living Color Enterprises, Inc. v. New Era Aquaculture, Ltd., No. 14-cv-62216-MARRA/MATHEWMAN (S.D. Fla. Mar. 22, 2016), Brown Jordan Int’l, Inc. v. Carmicle, Nos. 0:14-CV-60629, 0:14-CV-61415 (S.D. Fla. Mar. 2, 2016), and Ronnie Van Zant, Inc. v. Pyle, No. 17 Civ. 3360 (RWS) (S.D.N.Y. Aug. 28, 2017).

Read More

A New Mobile Devices Case Every Few Months – Mobile Device Discovery Series, Part 4

In this case law survey, we will briefly review a dozen cases from across the past five years that have touched on mobile device discovery issues.  We will review them in chronological order: E.E.O.C. v. Original Honeybaked Ham Co. of Georgia, Inc., Garcia v. City of Laredo, Pradaxa Products Liability Litigation, Hosch v. BAE Systems Information Solutions, Inc., Small v. Univ. Med. Center of S. Nevada, and Rajaee v. Design Tech Homes.

Read More

A New Collection Puzzle in Every Pocket – Mobile Device Discovery Series, Part 3

Because of the huge diversity in smartphone and tablet hardware and software, collecting from these sources poses special challenges and requires special tools.  These tools are collection kits akin to those used for forensic acquisitions from traditional computer sources, but they feature connection options for all of the common mobile standards and more specialized software for interfacing with the wide range of potential data formats, file systems, etc. When executing mobile device acquisitions, there are a range of options similar to those available when conducting traditional computer drive acquisitions.  Read on to learn more about the three types of acquisitions and the additional challenges presented by mobile device data after its acquisition.

Read More

A Different Diary in Every Pocket – Mobile Device Discovery Series, Part 2

Smartphones are far and away the most used type of mobile device (57% of all digital minutes, compared to just 9% for tablets).  Because of their importance, most organizations want their employees to use them for work, and employees typically want to be able to work on them.  A majority of companies now have or are planning to adopt BYOD-friendly policies, and many organizations are planning to start requiring employees to bring their own device.  As a result, a BYOD organization will have a veritable cornucopia of different smartphones in use by its employees.

Read More

A Supercomputer in Every Pocket – Mobile Device Discovery Series, Part 1

Today, the average smartphone “has more computing power than all of NASA when it put the first men on the moon in 1969.” The vast majority of your key players and other custodians will have one in their pocket. But what about business use?  As of 2015, 80% of people were using texting for business purposes.  Another survey found that, in 42% of financial services organizations, employees had requested authorization to use text messaging for business – double the 21% reported in 2016.  The same survey found that 83% of organizations now allow employees to use their personal devices for business communication. As a result, mobile devices are turning up frequently as relevant sources in litigation. Learn more about these trends and how they are growing into areas of concern.

Read More

Social Media Summary – Gone Viral Series, Part 8

This multi-part series on how to overcome the technical and legal challenges raised by the involvement of social media sources and data in electronic discovery ends with a summary and set of key takeaways. This includes covering social media sources of ESI, the acquisition, authentication, spoliation, reliability of evidence and the ethical concerns therein.

Read More

Ethics and Reliability in Social Media – Gone Viral Series, Part 7

In addition to the obvious need to not to intentionally spoliate or advise spoliation, the rise in the use of social media as evidence has developed ethics and reliability concerns for attorneys. Consequently, this rise in importance has led to additional questions that state bars have begun to address. Concerns are raised in the reliability of social media data gathered, as the Internet has seen a massive surge in deliberately fake content.  Some of it is intended only to entertain or advertise or get attention, but some of it is intended to sow confusion and misinformation.

Read More

Spoliation of Social Media Evidence – Gone Viral Series, Part 6

An August 2016 review by X1 uncovered more than 9,500 cases from the preceding 12 months in which social media evidence played a significant role – growth of more than 50% over the prior year. The rise in the presence of social media in the courts has led to preservation and spoliation concerns. Social media evidence is more frequently being treated as a standard source–if relevant, it must be preserved and produced and not altered, deleted, or hidden. It is clear from the six cases covered in this article that, while parties and their attorneys may be struggling with social media, courts are very comfortable treating it like any other source of evidence: if relevant, it needs to be preserved and produced; and, under no circumstances should it be intentionally altered, deleted, or hidden.

Read More

Social Media Evidence Authentication in the Courts – Gone Viral Series, Part 5

When looking at the authentication of social media evidence in the courts, we can focus on cases from Maryland and Texas. These were two of the first states to address these issues at the appellate level, and each staked out a different position that has since been followed by other states. The Maryland Rule embodies the fear of “voodoo information,” requiring a better demonstration of authenticity before the evidence can reach the jury, while the Texas Rule entrusts the disputed fact conclusions to the jury. The two approaches taken reflect the tension we reviewed in the previous part, between permissive rules and fearful judges.

Read More

Authentication and Admissibility of Social Media Evidence – Gone Viral Series, Part 4

In order for any of the materials you have preserved and collected to be usable at trial, they will have to be admitted as evidence. When it comes to successfully admitting social media as evidence, the materials must be both authentic and admissible. The admissibility of the evidence looks at its relevance, possibility of prejudice, and status of hearsay. Likewise, a witness with knowledge providing authenticating testimony and considering distinctive characteristics of evidence are examples of ways to establish authenticity.

Read More

Legal Mechanisms for Social Media Discovery – Gone Viral Series, Part 3

While the publicly-shared materials on social media services can be collected directly by any party, the non-public data in those user accounts can only be obtained through discovery. When traditional requests for direct scope negotiations fail, parties must try to work with alternative legal mechanisms within social media discovery. These have included In Camera Review, Password Requests, and Service Provider Subpoenas.

Read More

What Social Media ESI Can Be Collected in eDiscovery – Gone Viral Series, Part 2

Social media platforms typically incorporate multiple forms of media and communication together. Each social media account for each individual user can contain hundreds or thousands of pages of materials in a mishmash of formats. Vast amounts of social media ESI can be collected through eDiscovery, including all files and associated metadata. There are usually a variety of options for the acquisition of social media evidence for use in litigation. The most basic is printing out the material or capturing a screen image of it. This has the advantages of being fast, simple, and cheap, but it comes with significant drawbacks.

Read More

Social Media in Life and Discovery – Gone Viral Series, Part 1

Social media is becoming more frequently collected and searched in eDiscovery. As the last election cycle made abundantly clear, social media is currently an influential, indispensable part of American life. We will begin this series by exploring the legal challenges posed by social media in life and discovery, including sources, data, preservation, and more.

Read More

Archiving, Release, and Destruction of Information – The Importance of Information Governance as Preparation for Successful E-Discovery Series, Part 4

The governance of information addresses all aspects of its life cycle, and no stage is more important than this final phase. Data volumes continue to rise at an increased velocity, with 90 percent of all information having been created in the last two years. Keeping, archiving, cataloging and leveraging legacy data has been a solid and acceptable practice for nearly ever. While the storage of data becomes less expensive, the real issue is whether or not it is safe to hold on to unwanted and unneeded information. If the properly authorized destruction of data significantly reduces the risk associated with keeping data, shouldn’t it then be destroyed? Read on to learn more.

Read More

Using, Modifying, Storing, Retrieving Information – The Importance of Information Governance as Preparation for Successful E-Discovery Series, Part 3

The hard step that seems to give many organizations fits involves using, modifying, storing and retrieving information. Even if creating and ingesting are in perfect concert with information governance, chaos will result if this step doesn’t sustain that level of governance. Unfortunately, many organizations find it too cumbersome to set basic use restrictions. Learn how the governance of use, modification, storage, and retrieval come into play.

Read More

Microsoft 365 is Forcing Lawyers to Face Cloud Discovery

XDD’s Scott Polus shares insight with ACEDS’ Jason Krause about complications related to cloud-based data collection and review of that ESI.

Read More

Compliance and Leveraging Information Governance – The Importance of Information Governance as Preparation for Successful eDiscovery Series, Part 2

Often we become so busy generating information that we do not take the time to examine how that process looks and how we can apply information governance principles from the very beginning. Appropriate preparation is vital. More and more professionals are uniting in the belief that information governance is the single most critical factor in maintaining control of big data. However, compliance for its own sake is not enough. Organizations must be able to leverage said compliance and demonstrate how it benefits an organization. Read more to learn about the solutions for compliance as well as how to efficiently and effectively leverage information governance.

Read More

Information Governance as eDiscovery Preparation – The Importance of Information Governance as Preparation for Successful E-Discovery Series, Part 1

Much has been discussed regarding the importance of starting properly with respect to the necessary preparation for a successful electronic discovery process. Tools such as the Electronic Discovery Reference Model provide guidelines and best practices and continue to map out how to successfully negotiate the difficult and expensive landscape of electronic discovery. Organizations continue to “fight the good fight” as they begin making their way along the EDRM pathway. However, the pathway is dotted with obstacles that appear without warning and endanger the success of the e-discovery effort. Read on to learn more and how information governance comes into play.

Read More

Don’t Be Afraid to Let Your Document Review Travel: Why Legal Process Offshoring Might be Right for You

Offshore legal services offer significant savings in terms of both time and money, and, when managed correctly, can yield excellent results.

Read More

Computer Forensics Examiners and Private Investigation Licensing

Most agree that computer forensics examiners should be certified and licensed in some capacity, but should they be required to hold a PI license?

Read More

The Art of the Litigation Hold Notice: Complying with Rule 37(e) for Compliance’s Sake and Your Own

Having a well-written litigation hold notice is not just essential for compliance with the FRCP, but it will save time and money by keeping nondiscoverable, irrelevant information out of your data set.

Read More

Data Retention Policies and Litigation Holds: More Than Just a Formality

Recent case illustrates the importance of properly managing electronic data through the implementation of strong data retention and litigation hold policies in order to avoid sanctions.

Read More

Managing eDiscovery Costs: Who Should Perform Your Document Review?

Keeping idle associates temporarily occupied with document review may seem like an efficient use of resources, but it pales in comparison to organizing a well-trained, well-versed, consistent team of professional contract reviewers. The latter approach is not only more cost-effective, it is more efficient and produces a superior end product.

Read More

Whether you prefer email, text or carrier pigeons, we’re always available.

Discovery starts with listening.

(877) 545-XACT / or / Complete Contact Form