Microsoft change notice MC291088 announced the retirement of the Core eDiscovery Search by ID List feature because “it is not functioning to an adequate level and creates significant challenges for organizations who depend on consistent and repeatable results for eDiscovery workflows.” That is a remarkably frank statement that this feature was not working consistently. The […]
Over the decades I have driven far too many defensible deletion, classification or similar initiatives aimed at removing the ROT from corporate local, network and cloud data stores. I have wondered many times whether these were Sisyphean tasks even as I generated ROI estimates based on data reduction to justify the technology and labor costs. […]
A false positive is a result which appears to show that a particular condition or attribute is present when it is not. We have just passed the anniversary of what was potentially the worst false positive in history when, on … Continue reading …
In the introduction to my Electronic Evidence Workbook, I note that my goal is to change the way readers think …Continue reading →
The Obscenity list was one of the first automatic classification lists my team built into our Summation databases back in the bad old Enron days. We were one of the first defendants forced to search and review native raw email from the Exchange journal. Energy traders had filthy mouths and it was an easy way […]
Microsoft and Google are busy re-inventing how knowledge workers collaborate. Many of us have stumbled onto complex sets of interdependent Excel workbooks being shared by accounting, sales and other teams. With good chain-of-custody procedures, I have reconfigured environments so that counsel or experts could manually review these ‘semi-structured’ file sets to extract potentially relevant snapshots. […]
Apple plans to start scanning all U.S. iPhones for images of child sexual abuse using a tool called “neuralMatch” or “NeuralHash” against a database of known images. Womble Dickinson’s JDSupra article covers many of the high-level privacy concerns and explores Apple’s plans for a service that will scan encrypted messages for sexually explicit content to […]
With so many lawyers, litigation support professionals, paralegals and other members of the legal services industry working from home (and …
ESI Survival Guide INTERVIEW (Part 2) with Kevin Treuberg – Digital Forensics and Investigations SME
This is Part 2 of our extended discussion with Kevin Treuberg, one of the cybersecurity industry’s leading computer forensics and …
In this post, Craig Ball addresses the following question from a fellow eDiscovery professor, in sum and substance: Can a party refuse to produce “attachments” that are essentially included as links within an email, such as between Gmail and Google Drive?
In this post, Greg Buckles extracts some key eDiscovery takeaways from Aryaka’s fifth annual enterprise survey. He goes on to pose an important question to readers: As technology developments accelerate, SaaS applications proliferate, and the data deluge increases, searches for relevant information are becoming more difficult, but shouldn’t they be getting easier?
Craig Ball offers up some survival tips related to using eDiscovery review platforms, natives productions and our trusty ole friend the load file.