|

Linked – Think in Terms of What is Relevant, Not Producing Keyword Hits

The problem is that to many people involved in litigation, this is too much work:

“When requesting parties want all search hits in an email mailbox containing a common search term,  they are asking for trouble. Requesting communications between specific people, over a set period of time, regarding specific subject matter, is one way to draft narrowly tailored requests meets the goal of asking for relevant information. “

Josh is correct, as always. But, in order to get to those tailored requests you have to understand what it is you’re trying to get in terms of relevant information. Too many people simply want to “collect” and figure it out later, the same way they do when issuing litigation holds to their clients.

Of course, it makes no sense in either case.

As long as clients are not pushing back though, lawyers will continue to act this way. Clients need to be making sure their counsel does the work to avoid this kind of situation, which means doing their own work in monitoring their outside firms.

Not doing the work is going to cost, one way or another.

Think in Terms of What is Relevant, Not Producing Keyword Hits

Similar Posts

  • This Week’s Links (weekly)

    No Expert Testimony, No Motion to Compel tags: LitSupport MM Georgetown Part Two: New Rules Are Coming! tags: LitSupport MM Spotlighting the Top Electronic Discovery Cases from 2012 tags: LitSupport MM EDRM Publishes CARRM Framework tags: LitSupport MM Legal Technology Observer Showdown – with Audio link tags: MM LitSupport Litigation 101 for eDiscovery Tech Professionals:…

  • Links (weekly)

    eDiscovery Year in Review: eDiscovery Case Law, Part 4 tags: LitSupport MM eDiscovery Year in Review: eDiscovery Case Law, Part 3 tags: LitSupport MM Keeping It Together – Tracking Tasks and Decisions Related to eDiscovery tags: LitSupport MM eDiscovery Year in Review: eDiscovery Case Law, Part 2 tags: LitSupport MM 10 Quick iPhone Photography Tips…

  • |

    Linked: Women in cybersecurity need more than inspiration

    What Sherri talks about in regards to the security industry is something I’m seeing over and over again when reading about diversity. The child care question.

    Let me share another resource on the topic with you. In December, there was an episode of People I Mostly Admire with Claudia Goldin, where she talked about the concept of “Greedy work”.

    The topic she was chatting about was the gender pay gap and how much child care contributes to it, and one of the reasons we have a gender pay cap, aside from the percentage that is actually discrimination, is that greedy work doesn’t account for child care, but it pays more. So in many families, they have to make a choice between less pay and the flexibility to equally share the child care. The economics of that don’t usually make sense, so one parent takes on the greedy work to maximize the family income while the other steps back to a more flexible role in order to provide the majority of child care. With social norms being what they are, and the other issues that contribute to a gender pay gap, that most often means the man in a heterosexual couple, and here we are with women being vastly underrepresented in these types of positions.

  • |

    Linked – The Best Data Recovery Software of 2018

    First of all, it’s always good to keep this kind of list handy. Stuff happens and sometimes you need to try and get back files that were removed accidentally. Secondly though, as many of us move to SSD hard drives for the speed, it’s worth being extra careful when deleting from those drives: The reason…

  • |

    Linked – The danger of ‘I already pay for Apple News+’

    There’s lots more in the full article, but this does seem to sum up the problem for publishers. ““Why subscribe to that publisher? I already pay for Apple News+” should be the question haunting journalists’ nightmares. For readers, $10 per month all-you-can-eat from 300-plus publishers sounds like a great deal today. But it could accelerate…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)