Contact Us Today:   Email: info@docidediscovery.com | Phone: 678-567-6434 Schedule A Demo

Contact Us Today:

Email:
info@docidediscovery.com

Phone: 678-567-6434

LEGAL
TECHNOLOGY
COMPANY

Schedule a demo

5 Best Practices for Digital Evidence Collection and Preservation for Internal Investigations and eDiscovery

By Hans Willers The rise of electronically stored information (ESI) is both a blessing and a curse for eDiscovery professionals. On one hand, it can be easier to manage and handle digital data than to find yourself buried in paper records—provided you have the right tools, of course. But by the same token, you have [...]

By |2022-10-24T21:20:38+00:00October 24th, 2022|Collections, e-discovery, Investigations|0 Comments

7 Reasons to Use eDiscovery Solutions for FOIA Requests

By Jenna Walter, July 26, 2022 Do you know that government agencies receive an average of 755,000 Freedom of Information Act (FOIA) requests per year? That’s a lot to keep track of. To manage this influx of requests, many agencies are now turning to eDiscovery solutions. The advancement in technology has allowed agencies to automate [...]

By |2022-10-11T14:36:44+00:00October 11th, 2022|e-discovery, FOIA, Investigations|0 Comments

Protect What You Produce: Practical eDiscovery Lessons Learned from the Alex Jones Case

By Mike Gaudet & Richard Chung Introduction Making crucial errors in eDiscovery can prove detrimental to both lawyers and their clients. Nowhere is this more apparent than in the case of the Sandy Hook parents who won a $49.3 million judgment, including $45.2 million in punitive damages, against Alex Jones, the InfoWars founder and commentator. [...]

By |2022-08-23T12:00:37+00:00August 23rd, 2022|Collections, ediscovery, Investigations|0 Comments

E-Discovery Strategies For Handling Personal Identifying Information

E-Discovery Strategies For Handling Personal Identifying Information Russell Beets May 16th, 2022 We’re all familiar with the importance of avoiding the inadvertent disclosure of attorney-client communications, work product or sensitive, proprietary or confidential business information. However, our obligations don’t end there. In addition to protecting this information, we also need to consider how to handle [...]

Go to Top