The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer. All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information. This policy is subject to change at any time. The owner is not an attorney, and nothing posted on this site should be construed as legal advice. Litigation Support Tip of the Night does not provide confirmation that any e-discovery technique or conduct is compliant with legal, regulatory, contractual or ethical requirements.
Featured on the ACEDS blog.
Follow me on Twitter and see How-To Videos on my YouTube channel.
New tips for paralegals and litigation support profesionals are posted to this site each night. Click on the blog headings for better detail.
In November 2015, the New York City Bar Association published its E-Discovery Identification and Preservation Guide for Lawyers . This is a very simple 5 page outline which may be helpful for attorneys looking to gain a quick overview of the process. It give you some insight on the kind of things likely to be uppermost in an attorney's mind when you're assisting them with the collection of data at a client's offices.
The guides stresses the need to document the identification and preservation of electronically stored information. The main steps are simply determining the key issues; key custodians; relevant date range; and then implementing a litigation hold both directly on the client and on third parties that hold the client's data.
Attorneys are to consider either preparing a forensically sound copy of accessible ESI or a forensic image which includes deleted data. An inventory is to be prepared of data storage systems and a description should be given of the architecture of the email system. The attorney should investigate any monitoring of employees' computer usage, and also confirm that a company's document retention policy has been suspended