Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Hyperlinked Documents: The Latest e-Discovery Challenge

By Ryan Hemmel and Luke Groth
September 01, 2024

Dynamic files shared as links rather than attachments — known as hyperlinked documents — are emerging as a new frontier in the e-discovery landscape. As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.

|

How Cloud Storage Changed File Sharing

Cloud storage services such as OneDrive, SharePoint, and Google Drive have revolutionized file sharing, facilitating collaboration in an increasingly global workplace. By sharing links, users can distribute documents quickly, bypassing email attachment limits and physical transfers. These links allow recipients to view and edit files in real time, ensuring they always see the most up-to-date version. While convenient, hyperlinked documents introduce significant challenges for e-discovery professionals.

|

Understanding Hyperlinked Documents

A hyperlinked document is shared via a link or URL in an email or chat, rather than being physically transmitted as an attachment. The underlying file remains on a cloud server and can be accessed by clicking the link. Examples include:

|
  • Microsoft: Share > Copy Link > Paste the link.
  • Google Docs: Bookmark icon > Right-click Link > Copy link address.
  • Box: Hover over file/folder > Create and Copy Shared Link > Send Shared Link > Enter collaborator's email/name > Type a message > Send.

These documents are common in collaborative applications, offering advantages such as reduced email storage and real-time collaboration. However, their dynamic nature poses unique challenges for e-discovery.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

How Secure Is the AI System Your Law Firm Is Using? Image

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

Compliance and Third-Party Risk Management Image

To gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.