Interest Groups

Data Verification and Documentation: eDiscovery Identification Part 3 - E-Discovery, Information Governance & Cyber Security Section News

Get the news you want the way you want it: click the RSS button in the right corner to add this feed to your RSS reader, or click here to subscribe to this content. By subscribing, you’ll find this news on your Member Account page, and the latest articles will be emailed to you in your customized IndyBar E-Bulletin e-newsletter.

E-Discovery, Information Governance & Cyber Security Section News

Posted on: May 22, 2018

By Helen Geib, QDiscovery

This is the third and final part of a series on the identification stage of eDiscovery. Part one was an overview of purpose, process and practical considerations. Parts two and three are a detailed review of the five-step process of identification.

Step 4: Targeted follow-up

In step 3, a target list of relevant ESI was developed using custodian questionnaires and interviews. The next step is to circle back with the IT contact. It may also be helpful or necessary to follow up with records custodians, employees who don’t have substantive knowledge about the case but are most familiar with the actual ESI, such as records management staff and database administrators.

Read more.

If you would like to submit content or write an article for the E-Discovery, Information Governance & Cybersecurity Section, please email Kara Sikorski at


Indianapolis Bar Association (IndyBar) est. 1878 | 4,536 Members (as of 2.11.21)