When using Sanction 5, if a selected exhibit includes multip… When using Sanction 5, if a selected exhibit includes multiple pages, each page is listed separately in the Exhibit page list pane. Read Details
The number of custodians involved in an e-discovery project… The number of custodians involved in an e-discovery project has no impact on the cost of the project. Read Details
One way to help identify individuals who possess ESI that ma… One way to help identify individuals who possess ESI that may be relevant to a legal matter is to: Read Details
When using keyword search terms to identify ESI for processi… When using keyword search terms to identify ESI for processing, it is not necessary to test or refine search terms. Read Details
Data mapping is the process of creating a list of the IT and… Data mapping is the process of creating a list of the IT and data storage systems within an organization. Read Details
A “hash value” is a numerical value assigned to a native fil… A “hash value” is a numerical value assigned to a native file based on the unique contents and properties of that file and it functions as the digital fingerprint of that file. Read Details
It is necessary to implement a litigation hold: It is necessary to implement a litigation hold: Read Details
When searching for potentially privileged documents, which o… When searching for potentially privileged documents, which of the following will yield attorney-client privileged communications? Read Details
When preparing for a document review it is essential to form… When preparing for a document review it is essential to formulate a strategy for the review and develop a plan for executing on that strategy. Read Details