The Honorable Shira Scheindlin once opined against allowing custodians of ESI to collect their data stating “[s]earching for an answer on Google (or Westlaw or Lexis) is very different from searching for all responsive...more
In my December 2016 blog post, I wrote about how developing effective key words is very much an iterative and thought intensive process. This message was recently reaffirmed by a decision out of the Southern District of...more
One of last year’s worst TCPA cases was Meredith v. United Collection Bureau, Inc., 2017 WL 1355696, at *2 (N.D.Ohio, 2017) where a magistrate compelled production of wrong number class data and forced a defendant to bear the...more
The U.S. Supreme Court heard oral arguments this morning in United States v. Microsoft, No. 17-2, which presents the question whether a United States court may issue a search warrant to a U.S.-based electronic communications...more
Electronic discovery cases that made headlines in 2017 featured well-known names such as Taylor Swift and Lynyrd Skynyrd, and reached all the way to the U.S. Supreme Court. As the year draws to a close, it’s a good time to...more
When collecting electronically stored information (“ESI”) from multiple custodians (i.e., various individuals/ different sources), there will necessarily be duplicative documents collected in the process. In company-wide...more
A key word search is a basic search technique that involves searching for one or more words within or across a collection of documents/files. Typically, the purpose of a key word search in a litigation is to limit the...more