Jonathan Swerdloff

April 23, 2015

The Data Dump: what to do when you’ve received too much data?-Part 1

SCENARIO 1: YOU ARE LOOKING FOR SPECIFIC DOCUMENTS
Have you ever been overwhelmed by a document dump? If your adversary “dumps” a large amount of data on you, with little regard for relevance or organization, how do you deal with it? Years ago, you would have sent associates to a warehouse where they would pour over pages of moldy and musty documents and return with a few hot documents in a few months. Now, the volumes produced make that nearly impossible and prohibitively costly.
February 18, 2015

Getting to Know Your ESI: Early data mapping efforts pay dividends

he first two steps in the Electronic Discovery Reference Model are Information Governance and Identification. To be effective in each of these steps, you will need a data map. The last thing you want is to explain to a judge after a 26(f) conference that you’re “still trying to locate and understand the data” your client has stored. They have had the entire life cycle of their business to understand it; the fact that you or your outside counsel must scramble to do it now is unlikely to help your case. Further, with the increased focus on cooperation in the discovery phase of litigation, it is important to know what you have and how to meaningfully talk about it.
January 8, 2015

Archiving vs. Journaling: Saving the Right Stuff

Email threatens to overwhelm us all – over 100 billion business emails were sent every single day in 2013[1] and that number is expected to grow. Friends, colleagues, and now even inanimate objects all communicate by email. With this deluge in mind, how can an organization save their email in a comprehensive, defensible, and useful way? More to the point, how can they do that while only saving what they need rather than everything?
January 7, 2015

Bring Your Own App (BYOA)

If you have worked in the corporate world for the last five years you are likely familiar with the Bring Your Own Device (“BYOD”) concept. BYOD is the practice of allowing employees to use their personal computers, smart phones, and other devices to access company data and perform their jobs.
X