Extract from Lia Majid’s article “The Five Types Of People In eDiscovery”
I recently attended the inaugural ACEDS Ohio event. It was an educational program filled with engaging, interactive content. I found that the most interesting content highlighted the variety of approaches towards handling eDiscovery problems. In particular, the workshop at the end was really illustrative.
Audience members were presented a scenario. There is on-going business-to-business litigation. An employee has responsive ESI on their private phone: text messages they sent to other employees and marketing videos. But, the employee doesn’t want to give you access to the phone. How would you handle that situation?