When allegations of employee misconduct are alleged, companies must respond swiftly.  Indeed, “insider threats” can cause significant damage to a company.  These threats come in many different forms, including:

  • Accounting fraud;
  • Theft of assets;
  • Unauthorized access to or manipulation of data; and
  • Threats, sexual harassment or other inappropriate forms of behavior or communication.

And so,

The Honorable Shira Scheindlin once opined against allowing custodians of ESI to collect their data stating “[s]earching for an answer on Google (or Westlaw or Lexis) is very different from searching for all responsive documents in the FOIA or e-discovery context…” and “most custodians cannot be ‘trusted’” to effectuate a legally sufficient collection.  National Day

Data destruction is the process of removing information in a way that renders it unreadable (paper) or irretrievable (digital data). And, while it is critically important for companies to manage data in a way that is effective, defensible, and efficient, people/companies are often hesitant to dispose of data.  The cause of the hesitance is varied: 

Technology has revolutionized, among other things, the way people conduct business, store information and communicate with others.  And, despite the many efficiencies and benefits of technology, a downside of this “revolution” is the creation of countless files that may later be subject to review and potential production during litigation /investigation proceedings.  Indeed, even relatively small

I am often asked by clients and subscribers to the blog, What is E-discovery?  And so, this week’s post is intended to respond to that question.

E-discovery is the abbreviated term for electronic discovery and refers to the process in which electronic data (as compared to paper or object information) is sought, located, secured, reviewed

Whether we like it or not, a reality of today’s world is that often important business is conducted by text messages. And so, when it is time to issue a litigation hold notice, you must include an instruction to preserve text messages as well as the devices from which they are sent/received (i.e., smartphones).  Your