E-Discovery 201 Webinar Series: Evidence Admissibility, Expert Witnesses, Data Breaches

Judi Uttal

For the last three months we've been hard at work designing what we consider one of the best e-discovery webinar series available today. Working in concert with Joshua Gilliland of Bow Tie Law, we've assembled a team of experts to focus on the details of three advanced topics. This complimentary E-Discovery 201 webinar series features leading legal experts, including judges, specialist attorneys, and e-discovery consultants. Just as importantly, Continuing Legal Education (CLE) credits are available to those who attend the live event.

Strategies for Mitigating Business Risks Associated with Cloud Repositories

You may be among the many organizations who are considering deploying enterprise file synchronization and sharing solutions (EFSS) or cloud repositories to empower your mobile workers, implement BYOD policies, and support collaboration. You’re in good company.  Cloud adoption rates are rising as more and more companies deploy file synchronization and share capabilities, and the reasons for doing so are important: To enable their users to have access to data anywhere and to easily share that information and collaborate with their colleagues, partners and customers.

It’s working in their favor. According to Forrester:

  • 91% of companies reported increased productivity thanks to file sync and share
  • 70% of employees using file sync and share reported using it every day, while nearly one in five use it hourly.

  • But the challenges are also obvious:

    • Security teams haven’t been able to determine with certainty whether sensitive data is in the cloud
    • Performing e-discovery search and collections in a way that a court will accept could be both time-consuming and fraught with peril
    • Best practices for reducing risk when negotiating cloud vendor contracts are in the beginning stages of development.
    In fact, at Guidance Software, we’ve been integrating with leading EFSS and cloud collaboration systems like Dropbox for Business to make it all easier—and fully defensible from a legal standpoint. Take a look at our new paper, where we define the critical business requirements related to cloud and EFSS solutions and offer some advice on how to negotiate them into vendor business agreements. It also covers the challenges of collecting ESI from the cloud for purposes of e-discovery and highlights the integrations of EnCase® eDiscovery with Amazon S3, Box, Dropbox, Google Drive, and Office 365.


    Comments? Have best practices of your own? We welcome your thoughts in the Comments section below.

    Vote for the Biggest E-Discovery Challenges of 2015

    New trends in TAR, collecting ESI from the cloud, BYOD… When it comes to e-discovery, what’s keeping you up at night? With just a few keystrokes, you can make your concerns heard by participating in the second annual e-discovery professional’s survey. The survey is short, it’s focused, and all participants will see the results after analysis. To answer this brief survey, click here. To see last year’s results, click here.

    The “Shellshock” BASH Vulnerability and EnCase Products

    Ken Basore

    We know that our customers are concerned about the “Shellshock” BASH vulnerability and whether it affects our EnCase software, our Tableau hardware products, or any of our corporate systems. This is a legitimate concern, and because we have the utmost concern for your organizational and data security, we want to give you all the information you need regarding it. Below we address one by one the key areas that you may be wondering about.

    “E-Discovery Best Practices for IT” Webinar Highlights

    Jason Pickens

    IT teams are the unsung heroes of litigation, spending many hours searching for relevant electronically stored information (ESI), helping the legal team “herd cats” to ensure that custodians respond to litigation holds, and preparing massive files for both review and production phases. Having spent time with many legal and IT teams across North America and Canada, I’ve compiled a few best practices after some discussion with my recent webinar co-presenter and former colleague, Carl Wong, who’s an adjunct professor in forensic computing at the John Jay College of Criminal Justice.

    #1 – Bring Preservation and Collection In-House

    Lowering costs relative to both software and a streamlined collection process are big benefits, but not the only ones. No one understands your IT landscape better than you do, and it makes sense for you to be the drivers of a repeatable and defensible process that’s part of a total response plan. Bringing the oversight of the process in-house doesn’t mean your team has to do all the work, but rather that you should have control over the process for greater efficiency and lower risk.