Lessons Learned From the Overuse of ESI Protocols
ESI protocols have become a Frankenstein monster of requirements that create obligations well beyond the Federal Rules of discovery, addressing a vast array of discovery topics including search terms, privilege logs and technology-assisted review. What lessons can we take away from the overuse of ESI protocols? While not found in the Federal Rules of Civil [...]