April 8, 2015
Leading judicial voice in the field of Technology Assisted Review, US Magistrate Judge Andrew Peck, is at it again. Three years after his seminal Opinion asserting that Technology Assisted Review “is an available tool and should be seriously considered for use” in Da Silva Moore v. Publicis Group & MSL Grp., 287 F.R.D. 182 (S.D.N.Y. 2012), aff'd, 2012 WL 1446534 (S.D.N.Y. Apr. 26, 2012), he is revisiting the issue of TAR’s place in the e-discovery landscape in Rio Tinto PLC v. Vale S.A., Case No. 14 Civ. 3042 (Mar. 3, 2015 S.D.N.Y.).
February 18, 2015
he first two steps in the Electronic Discovery Reference Model are Information Governance and Identification. To be effective in each of these steps, you will need a data map. The last thing you want is to explain to a judge after a 26(f) conference that you’re “still trying to locate and understand the data” your client has stored. They have had the entire life cycle of their business to understand it; the fact that you or your outside counsel must scramble to do it now is unlikely to help your case. Further, with the increased focus on cooperation in the discovery phase of litigation, it is important to know what you have and how to meaningfully talk about it.
February 16, 2015
At this year’s Legal Tech, I once again had the honor of moderating the Judges Panel, including Judge John Facciola (D.D.C., retired), Judge Andrew Peck (S.D.N.Y), Judge Frank Maas (S.D.N.Y), and Judge Elizabeth Laporte (N.D.Cal.). This time, we had a provocative topic (or, perhaps –as Judge Peck put it–, a depressing one): “What’s Wrong with Discovery?”
February 9, 2015
Custodial interviews are a key part of discovery. Perhaps more than any other process, the interviews provide opportunities for successful, efficient discovery. However, if mishandled, they are likely to lead to later problems.
January 8, 2015
Email threatens to overwhelm us all – over 100 billion business emails were sent every single day in 2013 and that number is expected to grow. Friends, colleagues, and now even inanimate objects all communicate by email. With this deluge in mind, how can an organization save their email in a comprehensive, defensible, and useful way? More to the point, how can they do that while only saving what they need rather than everything?