Industry Leading
eDiscovery Insight

Learn from renowned eDiscovery thought leaders


Learn More

eDiscovery Buyers Guide Interviews Lexbe CEO, Gene Albert



Brett Burney interviews Gene Albert from Lexbe at Legaltech / LegalWeek 2019. They discuss how the Lexbe platform serves a variety of litigation scenarios for law firms of all sizes as well as in-house legal departments. Gene and Brett also discuss the features found in Lexbe including Integrated Messaging+ and the Uber Index.

The Seven Deadly Sins of Email

As well as 10 Heavenly Steps to Stay Out of Email Hell

Email communications continue to play a big role in eDiscovery and have contained critical evidence in support of malpractice claims. Join us for this informative session where you’ll learn the seven deadly sins of email as well as best practices to help you avoid malpractice claims. You’ll also learn how to use the seven deadly sins of email in discovery to help you identify evidence in document review. By attending this session, you’ll take away:
  1. Email communications that cause misunderstanding, exacerbate an issue or implicate the sender in a claim;
  2. Real world examples; actual claims cases and disputes;
  3. The tools to edit these cited emails, identifying inappropriate text and discussing alternative language or alternative methods of communication;
  4. Best practices for writing well-drafted emails that are clear, concise and actionable; and
  5. Litmus test questions to evaluate emails before sending, and to assess the need to send or further revise an email message with additional recommended preemptive actions.

Demystifying TAR for the Boutique Firm

Judges are increasingly recommending the use of Predictive Coding. Here’s what you need to know.

Complex litigation can yield hundreds of thousands, even millions, of electronically stored documents needing review. The monster task of reviewing this ESI can be prohibitive, especially for a boutique firm with limited resources. Technology Assisted Review (TAR) can be the solution, potentially slashing review time and saving money. Empirical studies show that TAR, also called Predictive Coding, can outperform linear review in accuracy and efficiency. Still, there is a reluctance to adopt this practice as the “black box” technology offers little in the way of transparency, and thus defensibility. During this session you’ll learn when and how to use TAR to bolster your in-house review capacity while reducing eDiscovery costs. Agenda
  • What is Technology Assisted Review (TAR)?
  • Why use TAR/Predictive Coding?
  • How does TAR/Predictive Coding work?
  • Importance of Transparency in TAR Applications
  • Parameters for TAR in an ESI Order or Stipulation

How To Solve The Challenges Of Reviewing Large Email Sets

The Top 10 Things the Boutique Lawyer Needs to Know for Effective Email Review in Discovery

With hundreds of billions of emails exchanging hands daily, each with its own unique metadata, container folder and possible attachments to examine, special consideration must be given to email at every stage of eDiscovery. Litigators and paralegals must effectively review ESI (Electronically Stored Information) during production, and great care must be taken to avoid producing confidential information. This webinar offers practical steps for moving email through the eDiscovery process while uncovering key evidence and ensuring that privileged information is not inadvertently leaked.
Agenda
  •  Managing increasing email volumes
  • What ‘delete’ really means
  • Best practices for displaying and reviewing attachments
  • Deciphering email headers
  • Detecting ‘spoofing’
  • Using culling and deduplication to eliminate unnecessary email
  • Methods to ensure full searchability of email
  • Understanding email time zones

Mastering Custodian Interviews & ESI Data Mapping

Best Practices in Building Your Case and Locating Key Case Evidence

The proliferation of ESI sources requires an approach that expands beyond email. Understanding the IT profile of the custodian and utilizing a data map is instrumental in identifying the key sources of ESI. The growth in apps, collaboration platforms, cloud storage and the Internet of Things (IoT) devices has resulted in the exponential growth in quantity and complexity of ESI sources. A thorough custodian interview and data map is critical to uncovering and organizing all relevant data sources. The data map not only minimizes the risk of overlooking important ESI but reveals, at a glance, potential holes in your collection. This webinar offers a guide to conducting a comprehensive custodian interview and how to organize that information to create a defensible data map.
Agenda
  • Workflow and Case Development
  • Why Interview Custodians?
  • Custodian Identification
  • Conducting Custodian Interviews
  • What is Data Mapping?
  • Benefits of Data Mapping
  • Data Mapping log
  • Data Mapping reports
 

Latest Blog

Subscribe to LexNotes

LexNotes is our monthly newsletter of eDiscovery and legal document management and review tips and best practices.