The process of discovery is now mostly related to exchange of electronic data i.e. information in electronic formats. This information in the electronic formats is known as ESI- Electronic Stored Information. The process of e-discovery is a lot of hard work as ESI is becoming exponentially diverse, voluminous and widespread. That is why we are there to help you.
- E-discovery is a combination of legal and technical disciplines. Since, there is no specific method of e-discovery. We can do e-discovery on common data sources such as company e-mails, Microsoft word documents, company specific databases. We can also do e-discovery for highly regulated industries such as finance and energy. Our e-discovery service could start from the time the law suit is foreseeable until all documents are presented in the court. We could provide assistance to lawyers in providing competent representation. Our e-discovery is not litigation specific. You get to decide your own discovery strategy.
- The principle of proportionality- The Devil is in the detail.
In today’s dynamic corporate data environment, in-house legal themes must adopt a proactive mentality when preserving data or else risk the inadvertent spoliation of date due to IT/ Business related activities. - We can draft your legal hold notice, prepare the list of required documents which would be required to substantiate the case. Our focus is on proportionality and reasonableness. We reasonably calculate, assess the requirement of substantive evidence and make discovery of admissible evidence which is relevant for the case.
- We have the capacity and capability of meeting project demands and comparing it to what should be expected; given the demand placed upon it by the organisation. We can index and collect the ESI, analyse the documents and make recommendations. You can either develop the remediation plan or we can do that for you and we will execute the scheme.
- We work on proportionality i.e. cost versus benefit. We protect your attorney client privilege. We adopt most up-to date methods to prevent information leak. The documents are classified and protected. We use china walls and system passwords to prevent open access. The work place is guarded and not open to all.