E-Discovery

 

What is E-Discovery?

computer investigationsElectronic discovery or discovery of electronic documents is nothing more than a tool used in litigation. It is similar to a regular discovery motion in the fact that one party is seeking information from the other. It is different in that it can be extremely technical in the way it is written and ordered. Common types of evidence requested may be:

  • E-mail with full headers
    • Inbox
    • Outbox
    • Drafts
  • Address books
  • Word-processing files
  • Spreadsheets
  • Database files
  • Graphics
    • Pictures
    • Tables
    • Charts
    • Graphs
  • Software
  • Internet use Bookmarks
    • Cookies
    • History logs
    • Temporary internet files

An e-discovery order will also include instructions on the scope and limits of the search maintaining relevance to the case.

 

Why is E-Discovery Needed?

The proliferation of computers in our everyday lives explains why more and more criminal and civil court cases include motions for electronic discovery. An e-discovery order will obligate a party to retain, preserve, collect, and produce electronic documents. The data requested will normally require access to:

  • Desktop and laptop computers
  • Network hard drives
  • Removable media CDs
    • DVDs
    • Tapes
    • Floppy discs
    • USB devices
    • Flash drives
    • Zip discs
  • Personal Digital Assistants
    • Cell phones
    • Palm Pilots
    • BlackBerrys

An attorney's inadequate compliance with an e-discovery order could lead to serious judicial sanctions along with the risk of malpractice claims. Courts are typically unforgiving when it comes to attorneys who:

  • Do not demonstrate a clear understanding of the e-discovery process
  • Do not recognize potentially relevant digital evidence that may benefit their case

 

Why use Bosaw & Associates for E-Discovery?

Bosaw & Associates LLC fulfills e-discovery orders using the latest hardware and software tools to deliver a cost effective e-discovery solution for public and private organizations. We utilize superior data manipulation techniques to expedite the extraction of relevant information.

Some of these processes include:

User Filtering

  • Segregating key computer users who may be relevant to the case
  • Isolating files associated with those specific individuals

Timeline filtering

  • Sorts periods of time relevant to a case or which are required by order

Keyword searching

  • Searches data by keywords to find relevant information

Remove known filtering

  • Identifies and hides data known to be irrelevant

 

We are able to interpret the order, provide Technical Litigation Support and adhere compliance for either party involved.