By Helen Geib, QDiscovery
This is the third and final part of a series on the identification stage of eDiscovery. Part one was an overview of purpose, process and practical considerations. Parts two and three are a detailed review of the five-step process of identification.
Step 4: Targeted follow-up
In step 3, a target list of relevant ESI was developed using custodian questionnaires and interviews. The next step is to circle back with the IT contact. It may also be helpful or necessary to follow up with records custodians, employees who don’t have substantive knowledge about the case but are most familiar with the actual ESI, such as records management staff and database administrators.
If you would like to submit content or write an article for the E-Discovery, Information Governance & Cybersecurity Section, please email Kara Sikorski at email@example.com.