Howe Law Firm
  • Events
  • Locations
  • Blog
  • FAQs
  • Resources
  • About
  • Case Types
  • Contact Us
  • English
  • My account

search

 

phone

(800) 348-4698

Menu
  • Home
  • e-Discovery and Forensics
    • Mobile Phone Evidence
      • Text Messages
      • Phone Metadata
      • Voicemails
      • Phone Call Logs
      • Contacts
      • GPS & Locations
      • Phone Internet History
      • Phone Bookmarks
      • Close
    • Tablet Forensics
      • iPads
      • Android
      • Close
    • Email Evidence
    • Computer Evidence
      • Backups
      • Computer and Smartphone Forensics
      • Computer File Types
      • Computer Internet History
      • Computer Log Files
      • Computer Metadata
      • Computer Web Bookmarks
      • Google Docs & Sheets
      • Mac Computers
      • Photos & Images
      • Servers
      • Videos
      • Virtual Machine and eDiscovery Forensics in Litigation
      • Windows Computers
      • Word, Excel, PDF files
      • Close
    • Social Media Evidence
    • Online Cloud Evidence
    • Database Evidence
    • Website Evidence
      • Search Technologies
      • Close
    • Legal Review Platform
    • Close
  • Remote Collection
  • Expert Services
    • Expert Witness
    • Joint (Neutral) Expert
    • Special Master
    • Database Expert Witness
    • Litigation Response Plan
    • Discovery Protocols
    • Discovery Requests & Pleading Preparation
    • Document Review
    • Trial Presentation Exhibits
    • e-Discovery Legal Consulting
    • Asset and Background Reports
    • Digital Asset Recovery after Death
    • Close
  • Counter Surveillance
    • Quote
    • FAQs
    • Home Bug Sweep
    • Home Router Hacking Detection
    • Business Bug Sweep
    • Vehicle Bug Sweep
    • Phone Spyware and Hacking Detection
    • Computer Spyware and Hacking Detection
    • Email Spying and Hacking
    • Social Media Spying and Hacking
    • Online Account Spying and Hacking
    • Conference Rooms
    • Boat Bug Sweep
    • Airplane Bug Sweep
    • Personal Items
    • Signs of Surveillance
    • Cyber Security & Cyber Forensics
    • TSCM Equipment
    • Close
  • Shop
      • Home under video surveillanceHome Bug Sweep Services Cost
      • internet router malware and hacking analysisHome Router Analysis Cost
      • business router analyzed for hackingBusiness Router Analysis Cost
      • business conference room under video surveillanceBusiness Bug Sweep Services Cost
      • white compact suv and gps trackerVehicle Bug Sweep Cost
      • cell phone being analyzed for spyware malware and hackingPhone Spyware & Hacking Detection Cost
      • ipad tablet being analyzed for spyware malware and hackingiPad/Tablet Spyware & Hacking Detection Cost
      • computer being analyzed for spyware malware and hackingComputer PC/Mac Spyware & Hacking Detection Cost
      • email account being analyzed for spyware malware and hackingEmail Account Analysis Cost
      • woman on phone with social media account bubbles floating in front of her and being analyzed for spyware malware and hackingSocial Media Account Analysis Cost
      • screenshot of login page to online account to evaluate for spyware, malware, and hackingOnline Account Analysis Cost
      • luxury boat under video surveillanceBoat Bug Sweep Services Cost
      • private jet under video surveillanceAirplane Bug Sweep Services Cost
      • yellow external hard drive with threat of spyware, malware, and hackingExternal Hard Drive Analysis Cost
      • red and blue usb thumb drives plugged into computer with threat of spyware, malware, and hackingThumb/SD Drive Analysis Cost
    • Close
  • Fees
  • Order
    • New Client Form
    • Email Evidence Report
    • Facebook Evidence Report
    • Remote Collection Unit
    • Person Asset and Background Report
    • Business Asset and Background Report
    • Close
Home » Expert Services » Discovery Protocols

Discovery Protocols

What is a Litigation Discovery Protocol?

A litigation discovery protocol (aka, ESI Discovery Protocol) governs the preservation, collection, and production of Electronically Stored Information (ESI). For example, an ESI discovery protocol may identify the sources of data to search, date filters and search terms to apply, and production formats. 

Discovery Protocols with image of gears and icon people with arrows showing concept of protocol
Parties develop a discovery protocol for electronically stored information

Do you Need an ESI Discovery Protocol?

Yes! The earlier you develop a discovery protocol the better. First, it will help you and your client comply with preservation obligations and avoid sanctions. Second, you will reduce your eDiscovery costs. Third, it will help you find relevant evidence quickly. After all, the faster you find what you need, the better positioned you will be to negotiate settlements. 

What’s better, a Joint or Individual Discovery Protocol?

Commonly, each party to a lawsuit has its own ESI discovery protocol. Ideally, however, the parties will negotiate and agree on a protocol together during their meet and confer conferences. Specifically, it is early negotiation that will limit the scope of discovery and thereby reduce costs for everyone.

What goes in a Litigation Discovery Protocol?

The first goal of an ESI discovery protocol is to identify all sources of potentially relevant information. For example, who are the key custodians and which devices or accounts of theirs should be preserved, and how. Then, you want to determine the best ways to cull the data to help you find relevant items faster. You also need to consider when and how to produce ESI to the other side. Specific items you may agree on include: 

  • Who are the primary custodians likely to have relevant information.
  • Which of those custodians’ devices and accounts (e.g., which phones, computers, emails, or social media accounts) should be preserved.
  • Build a list of the relevant search terms and language to apply to cull the data. 
  • Specify the relevant time frame for the issues in the case. 
  • Are some data types more important? Which ones are irrelevant? (e.g., text messages? Spreadsheets? Internet history? Emails?)

 

Over many years, we have developed The Litigation Discovery Protocol, also known as an ESI Discovery Protocol. In fact, both federal and state court discovery orders have referenced it. As your e-Discovery & Digital Forensic Expert, we help you strategize, negotiate, and implement a litigation Discovery Protocol. Critically, it will keep you in compliance with FRCP 26(f) meet and confer requirements.  Other items we cover in a litigation Discovery Protocol include:

  • Limiting digital communications like text messages, emails, and call logs to only those from certain people;
  • Cull privileged communications;
  • Layout a Discovery Schedule; and
  • Specify the method of production.

 

Discovery Protocol Implementation

We will help you implement your Discovery Protocol to collect, cull, and prepare electronically stored information (ESI) for legal review. Of course, we exclude all attorney-client and other privileged communications from production to the other party. With the above-described filters, we hone your ESI to the most likely relevant items. Consequently, this greatly reduces costs and increases your response time.

  • Home
  • Services
  • Fees
  • Case Types
  • Events
  • FAQs
  • Links
  • Blog
  • About Us
  • Contact
  • Account details
  • 0 items$0.00

Copyright © 2023

Howe Law Firm
Main (503) 227-6660
Howe@HoweLawFirm.com
Pay Your Invoice Securely with LawPay
  • Albuquerque
  • Anaheim
  • Atlanta
  • Bakersfield
  • Baltimore
  • Boise
  • Boston
  • Chicago
  • Columbus
  • Dallas
  • Denver
  • Detroit
  • El Paso
  • Fort Worth
  • Fresno
  • Houston
  • Irvine
  • Jacksonville
  • Kansas City
  • Las Vegas
  • Long Beach
  • Los Angeles
  • Memphis
  • Miami
  • Milwaukee
  • Minneapolis
  • New York
  • Oakland
  • Orlando
  • Philadelphia
  • Phoenix
  • Pittsburgh
  • Portland
  • Reno
  • Riverside
  • Sacramento
  • San Antonio
  • San Diego
  • San Francisco
  • San Jose
  • Santa Ana
  • Santa Rosa
  • Seattle
  • Spokane
  • St. Louis
  • Stockton
  • Tacoma
  • Tampa
  • Tucson
  • Vancouver
  • Washington DC
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter
  • YouTube
Copyright © 2018, HoweLawFirm.com. All Rights Reserved | Privacy Statement | Terms Of Use