Summary
The range of potential electronically-stored information (ESI) sources is continually multiplying and diversifying. In order to work with that diverse range of materials during assessment, during review, at depositions, and at trial, we need a way to avoid using as many different pieces of software as there are types of sources and a way to enable searching and document identification across different source types. It is for these reasons that we need processing. Moreover, ESI processing for discovery is one of the areas in which legal practitioners need some level of understanding to fulfill their duty of technology competence for eDiscovery.
Although it is often given short shrift compared to the steps that come before it (identification, preservation, and collection) and after it (assessment, review, and production), effective processing is critical to the success of those downstream steps and includes a variety of important technical decisions that can have substantive effects. For example, if processing is not performed correctly, or if the wrong decisions are made, searches can be rendered unreliable, materials can be rendered unusable, and production options may be affected. In this free Practice Guide, Consilio Director of Education Matthew Verga, Esq., reviews the fundamentals legal practitioners need to know about processing.
In this Practice Guide
- Essential Steps and Common Tools
- Common Errors and Special Cases
- Content Filtering Options
Key Insights
- The Four Core Activities
- The Limits of Content Filtering
- Potential Additional Steps
Practice Guide Download
About the Author
From the author
Alphabet Soup: TAR CAL, and Assisted Review
Over the decade since TAR first rose to prominence, solutions, acronyms, and new cases have proliferated dramatically. All of this rapid technical and legal evolution has made it challenging for practitioners to get a simple handle on TAR and CAL approaches and what they mean for their matters.
Six Data Protection Strategies for Legal Teams: Mitigating Risk, Maintaining Reputation
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.