Interest Groups

Four Pillars of Defensible Collection Plans - E-Discovery, Information Governance & Cyber Security Section News

Get the news you want the way you want it: click the RSS button in the right corner to add this feed to your RSS reader, or click here to subscribe to this content. By subscribing, you’ll find this news on your Member Account page, and the latest articles will be emailed to you in your customized IndyBar E-Bulletin e-newsletter.

E-Discovery, Information Governance & Cyber Security Section News

Posted on: Sep 27, 2018

From QDiscovery:

By Helen Geib, QDiscovery

In the eDiscovery lifecycle, collection is the stage of copying electronically stored information in order to make it available to the legal team for review and production. Identification determines the scope of collection while preservation ensures that relevant ESI is there when it’s needed. Collection follows and depends on identification and preservation. There are four pillars of defensible collection plans.

Collection is simple in theory. In practice, it’s frequently complicated, difficult or expensive – if not all three. Litigants have a duty to collect potentially responsive ESI, including metadata. They also must avoid spoliation of evidence, which can occur when ESI is destroyed or altered during collection. On the other hand, the cost of the collection is important to the bottom line. The expense of discovery should be proportional to the value of the case.

The fundamental goal at this stage is to make the collection both defensible and cost-effective. Defensibility and cost-effectiveness are closely tied together. Each depends on selecting the optimal processes and technology tools.

Read more.

If you would like to submit content or write an article for the E-Discovery, Information Governance & Cybersecurity Section, please email Kara Sikorski at


Indianapolis Bar Association (IndyBar) est. 1878 | 4,536 Members (as of 2.11.21)