What is ediscovery, e-discovery or electronic discovery?


“Electronic discovery has been described as the “process of identifying, preserving, collecting, processing, searching, reviewing, and producing Electronically Stored Information that may be relevant to a civil, criminal, or regulatory matter.” Maura R. Grossman and Gordon V. Cormack, The Grossman-Cormack Glossary of Technology-Assisted Review, Vol. 7 Federal Courts Law Review 2013 1, 15 (2013); Junk v. Aon Corp., No. 07-4640, 2007 U.S. Dist. LEXIS 89741, at *2 n.2 (S.D.N.Y. Nov. 30, 2007) (“E-Discovery is the disclosure or discovery of electronically stored information, including the form or forms in which it should be produced …”).” Arkfeld on Electronic Discovery and Evidence § 7.1

eDiscovery training and Instruction certification


Wikipedia - “Electronic discovery (also e-discovery or ediscovery) refers to discovery in legal proceedings such as litigation, government investigations, or Freedom of Information Act requests, where the information sought is in electronic format (often referred to as electronically stored information or ESI).[1] Electronic discovery is subject to rules of civil procedure and agreed-upon processes, often involving review for privilege and relevance before data are turned over to the requesting party. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence. Electronic information is usually accompanied by metadata that is not found in paper documents and that can play an important part as evidence (e.g. the date and time a document was written could be useful in a copyright case). The preservation of metadata from electronic documents creates special challenges to prevent spoliation. In the United States, at the federal level, electronic discovery is governed by common law, case law, specific statutes, but primarily by the Federal Rules of Civil Procedure (FRCP), including amendments effective December 1, 2006, and December 1, 2015.[2][3] In addition, state law and regulatory agencies increasingly frequently also addresses issues relating to electronic discovery. Other jurisdictions around the world also have rules relating to electronic discovery, including Part 31 of the Civil Procedure Rules in England and Wales.”

eDiscovery Education Center (www.edec.com) provides instructional and training content to the legal community in the areas of eDiscovery, digital evidence and forensics, and data analytics. Preservation, discovery, production, and admissibility of evidence has changed dramatically. It is important that the eDiscovery team uniformly learn about eDiscovery to assist and protect your clients and yourself.

“Litigation is transforming as the world transitions to the 'digital' information age. Preservation, discovery, production, and admissibility of evidence has changed dramatically. Now is the time for your eDiscovery team to uniformly learn about eDiscovery to assist and protect your clients and yourself.” – Michael Arkfeld

We firmly believe that your entire eDiscovery team and organization (attorneys, paralegals, litigation and IT support staff, and other legal professionals) who "touch" eDiscovery matters should have access to the same testing and eDiscovery training and instructional content. For this reason, we have designed our courses and low subscription rates for a group (law firm, government unit, corporate office, etc.) for all EDEC on-demand instructional content which includes a team eDiscovery assessment. The test is separated into legal and IT issues that will arise in your cases. Every litigator and person in your organization who "touches" a matter involving "electronically stored information" should take a "basic" eDiscovery course. Often, I hear of stories of legal professionals, for example, who fail to recognize "triggering" legal hold events and the ensuing court sanctions that follow.

Depending How Your eDiscovery Team is "structured" and the different team member roles will be factors in choosing a particular eDiscovery training or course. This course readings for the "ESI Pretrial Discovery: Critical Issues, Strategy and Tactics" course (both basic and advanced) are from the "Arkfeld's Best Practices Guide - Arkfeld's Best Practices Guide for ESI Pretrial Discovery" (approximate cost $98). This course readings for the "Information Technology (IT) for Legal Professionals" course (both basic and advanced) are from the "Arkfeld's Best Practices Guide - Information Technology (IT) for Legal Professionals" (approximate cost $98). The "Master" course is supplemented by the Arkfeld' on Electronic Discovery and Evidence treatise and four Best Practices Guides. After the discount, the cost of the publications is approximately $250.

You may already have these publications available through your organization's Lexis Advance online legal research subscription or they may be in your library. To save 30% on the individual best practice guides (approximately $98 after the discount) or the entire set of publications including the Arkfeld on Electronic Discovery and Evidence (4th ed.) treatise and the four Best Practice Guides (approximately $250 after the discount). please reference or enter promotion code: 2020EDEC30.

To order visit the LexisNexis® Store at http://www.lexisnexis.com/2020EDEC30. If you have further questions, call 800.223.1940 to speak with a LexisNexis® account representative. If you are already a subscriber to Lexis Advance, you may already have access to all of the publications for this course without the need to purchase them. Check with your librarian.
How does electronic evidence differ from paper evidence?

Digitized information takes on quite different characteristics from paper evidence. ESI is handled differently and in many ways, contains information of greater value than paper information. Always remember that ESI is not just text or data, but also includes audio, video and graphics.

• Informal Nature
Because of its informal nature, email and text messaging has encouraged senders to write unguarded, unwise, and often, inappropriate comments. This informal nature of comments also applies to word-processing documents that have been revised by one or many authors.

• Metadata/Hidden Evidence
Electronic data files contain metadata, hidden data, or embedded data. Metadata is additional, and often valuable, information about the electronic data file, which does not appear on a printed copy of the electronic file. Metadata is found in email messages, word-processing documents, spreadsheets, audio, video and all other computer files. In word-processing documents, it may contain prior revisions, dates of revisions, authors, and other information.

• Preservation
Litigants have an obligation to preserve electronic evidence and prevent its spoliation when litigation is “reasonably anticipated.” However, ESI can be changed, overwritten, or obliterated by normal everyday use. The simple acts of booting up a computer, opening a file, failing to suspend an auto-delete retention procedure, adding new data onto a hard disk, or running a routine maintenance program on a network can alter or destroy existing data without the user’s knowledge.

• Searching ESI
Computer-based ESI is easier to search than paper documents and provides a lower cost for retrieving and managing case information. One critical feature that distinguishes ESI from paper is that information contained in an electronic format can be searched for specific words, phrases, concepts, dates, or documents and the results can be retrieved instantaneously. In addition, new search techniques, such as “predictive coding,” can be applied since, generally, it will save cost and time. “Predictive coding” describes the integration of technology into the process of human document review. Predictive coding is the electronic coding, organization, and prioritization of ESI, by lawyers specifying relevant criteria, to identify responsive, privileged, and other documents during the discovery process.

• Volume
The large, and ever increasing, volume of ESI generated during contemporary business and government operations raises serious challenges and risks to the cost of locating, reviewing for privileges, and producing information. This is unlike paper-based discovery where the physical nature of paper, folders, and file cabinets limits the amount of paper that is printed and stored.

• Deletion
It is a myth that deleting a computer file, such as a word-processing document, will cause it to be destroyed. When a computer user pushes the delete key to erase a document, he or she is not destroying the document data, but instead merely removing the pointer or computer address of the document. The data remains until it is overwritten by new data, reformatted, or deletion software is applied.

• Storage Locations
One of the most challenging issues involved in eDiscovery is pinpointing the physical location of ESI. ESI can be stored on devices, ranging from pen drives (resembling a small ballpoint pen) to cloud computing and mainframe computers. This is dissimilar from paper-based discovery, where file cabinets, folders, and documents are generally located in specific physical locations. Searching and locating ESI in a modern, distributed business/government computing environment can be a challenging task.

• Disorganization
ESI is disorganized. It is the exception for ESI to be stored accurately in directories, subdirectories, and folders. Generally, since ESI can be found by searching for specific words or other data, users tend to store ESI in various unrelated computer systems or directories.

• Redundancy Archived and Backup Copies
ESI is constantly and consistently being backed up or archived to ensure recovery in the event of loss of data or a disaster. It is commonplace to backup important computer information on a daily, weekly, monthly, or other periodic basis.

• Destroying, Concealing, Altering, or Protecting ESI
ESI, such as a word-processing document, image, audio recording, graphic, or video recording can be destroyed, concealed, altered, or protected in ways that are difficult to detect without using computer forensic techniques.

• Alterations
Alterations to electronic documents are sometimes difficult to detect, if not impossible.

• Compound Documents and ESI
Usually we think of an electronic file as constituting all the information about a document. This may be true in some instances, such as in a memo or a spreadsheet. However, in some cases, an electronic document may be composed of information stored in different electronic files, such as a distributed database, which may even be located on different servers in different parts of the country.