Defensible Deletion Strategy: Getting Rid of Your Unnecessary Data
Here is a basic overview of what defensible deletion is, the FRCP stance on maintaining ESI and considerations for developing your own deletion strategy.
Get the foundation you need to hire the best legal talent.
Request your copy of our 2021 Salary Guide »Here is a basic overview of what defensible deletion is, the FRCP stance on maintaining ESI and considerations for developing your own deletion strategy.
Conduct a thorough eDiscovery custodian interview with these 3 best practices that will help you focus on the case, verify the facts, and document the process.
Conducting internal investigations requires effective communication and defined responsibilities for the key departments that are involved in the process.
See how using Office 365 Advanced eDiscovery can help you save on overall costs by enabling you to focus on key documents and prioritize your review.
It’s crucial to stay informed on the constant revisions to China’s cybersecurity law and strategy – here are 5 updates and events you should know about.
This blog explains the role of paralegals under the California Business and Professions Code – and the result of insufficient qualifications when called into question.
This post explains five steps that will prevent excess review costs, improve overall efficiency, and maintain defensible protocols for a repeatable process.
This post highlights some of the key Rules of Professional Conduct and identifies the top ten responsibilities everyone has when involved in the eDiscovery process.
These 3 best practices will help you conduct a defensible intellectual property theft investigation to find key evidence with digital forensic expertise.
Recently, I summarized the eDiscovery process in three simple phases: Phase 1 – Identification, Preservation, Collection, Phase 2 – Data Analysis, Reduction, Analytics and Phase 3 – Processing, Review, Production, as well as discussed the risks that…