The Ultimate Discovery Meet-And-Confer Checklist

Are you familiar with the power of a good checklist? As an attorney, paralegal, litigation support professional, or eDiscovery expert, your head is always swimming in details. ...
Read More

Mobile Device Data: Could It Be Synchronized Elsewhere?

If you are a savvy technology user, you probably understand that every time you use your mobile device, you leave a digital trail. These footprints may track every email, text, ...
Read More

Gone Phishing – Part 2

In our prior post, we discussed what phishing attacks are, how they work, and the impact they can have on you and your organization. In this installment, we’ll focus on how to ...
Read More

New LeanReview™ Investigations and eDiscovery Service Empowers Case Teams To Do More With Less

In the complex world of eDiscovery and corporate investigations, billions of data points are collected, processed, reviewed, and produced every day. Each piece of data has the ...
Read More

Structured Data Collection And Preservation

Top 5 Reasons To Use An Outside Consultant You just got off the phone with outside counsel and they want data – lots of data. Your company is embroiled in litigation, and ...
Read More

Doing Good And Giving Back: Pro Bono In eDiscovery

Doing Good And Giving Back: Pro Bono In eDiscovery In 1919, Reginald Heber Smith wrote the seminal article “Justice and the Poor,” laying out the irrefutable argument that ...
Read More

Text Message Screenshots: Real Or Fake?

Fake news, false identities, and phony emails – in today’s digital world, it is becoming increasingly more difficult to detect fact from fiction.
Read More

Gone Phishing – Part 1

With the first signs of summer in the air, one’s thoughts may turn to fishing…wait…wrong blog…
Read More

Employees: Weakest Link Or Best Defense?

I hear this bit of conventional wisdom quite a bit: “Employees are the ‘weakest link’ in the cyber defense chain.” I understand why we say it. Heck, I’ve been guilty of saying ...
Read More

Trust But Verify: How To Approach Electronic Evidence

When word processing and graphic design became desktop tools, there was a concern that bad actors now had the ability to create fake documents. And some did. But today, even as ...
Read More