Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

e-Discovery of Structured Data

By Erik Post and Jim Vint
April 30, 2009

How did an event happen? What proof do you have? Further, what proof do you need?

At the outset of an investigation, timelines and custodian-created information assets can all be garnered from extracts of accounting data, e-mails and documents through traditional discovery and disclosure. None of this tells you how, specifically, an event or series of events occurred. Were the alleged claims the result of system control errors, malicious employee action, fraud or simple misrepresentations by management as a means of covering up systemic losses by cooking the books to avoid audit concerns?

Read These Next
New York's Latest Cybersecurity Commitment Image

On Aug. 9, 2023, Gov. Kathy Hochul introduced New York's inaugural comprehensive cybersecurity strategy. In sum, the plan aims to update government networks, bolster county-level digital defenses, and regulate critical infrastructure.

Law Firms are Reducing Redundant Real Estate by Bringing Support Services Back to the Office Image

A trend analysis of the benefits and challenges of bringing back administrative, word processing and billing services to law offices.

Bit Parts Image

Summary Judgment Denied Defendant in Declaratory Action by Producer of To Kill a Mockingbird Broadway Play Seeking Amateur Theatrical Rights

Risks of “Baseball Arbitration” in Resolving Real Estate Disputes Image

“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.

One Overlooked Element of Executive Safety: Data Privacy Image

Executives have access to some of the company's most sensitive information, and they're increasingly being targeted by hackers looking to steal company secrets or to perpetrate cybercrimes.