ACEDS Flashcards
What is discovery?
A.  The phase in litigation when parties file there lawsuits.
B. The phase in litigation when parties exchange information about their case.
C. The phase in litigation when parties file motion for summary judgment.
D. The phase in litigation when parties appeal the decision of the court.
B. The phase in litigation when parties exchange information about their case.
The failure to preserve ESI, participate or cooperate in discovery, may result in:
A. The loss of relevant ESI
B. Increased time and cost devoted to E discovery
C. Sanctions under rule, 37 of the FRCP
D. All of the above.
D. All of the above.
Under rule, 26 of the FRCP, discovery may be made of:
A. Anything, and everything within the control of a party
B. The documents a party intends to use at trial.
C. Non-privileged information and ESI, relevant to the claims and defenses and proportional to the case
D. All materials sought by the requesting party 
C. Non-privileged information, and ESI relevant to the claims and defenses and proportional to the case.
What can affect data storage in the preservation and collection of ESI?
A. Reallocation.
B. Hardware maintenance.
C. Upgrades.
D. Decommissioning.
E. All of the above.
E. All of the above.
To properly plan for an ediscovery project it is necessary to:
A. Understand basic technology, and sources of ESI.
B. Become an IT infrastructure expert.
C. have a computer science degree.
D. Write a machine learning algorithm for use in AI
A. Understand basic technology, and sources of ESI.
True or False: The term metadata refers to data about data in the file attributes or properties of a file
True
True or false: businesses should preserve every document forever
False
What is the first step in creating a data map?
A. Gather data about the ESI stored.
B. A list all of the organization’s IT systems.
C. Include a list of relevant employees.
D. None of the above.
B. List all of the organizations IT systems.
When an organization learns that it has been sued, or reasonably anticipates that it will be named in a lawsuit, what is one of the first things the organization should do?
A. Delete all data that may not be favorable.
B. Identify a back up media created by the company.
C. Take steps to preserve ESI an implement a legal hold.
D. None of the above.
C. Take steps to preserve ESI an implement a legal hold.
Which of the following is not part of identifying and preserving ESI?
A. Identifying the sources.
B. Contacting the FBI.
C. Identifying the custodians.
D. Implementing a legal hold.
B. Contacting the FBI.
The duty to preserve documents, and ESI in litigation is triggered by:
A. Actual notice of a lawsuit.
B. Reasonable anticipation of a lawsuit.
C. Receipt of a government or regulatory inquiry
D. A public accident resulting in injuries.
E. All of the above.
E. All of the above.
A ______ is a notice distributed within an organization, that directs individuals in management to preserve ESI.
A. Release notice.
B. Custodial source.
C. Legal hold.
D. Adverse inference instruction.
C. Legal hold.
ESI is collected in one of two ways: a forensic collection, or a _____ collection
A. Deleted.
B. Personal.
C. Targeted.
D. None of the above music.
C. Targeted.
Which of the following is a validation safeguard when collecting ESI
A. Chain of custody documenting all collection steps.
B. Creating hash values.
C. Write blocking the data.
D. All of the above.
D. All of the above.
The goal in processing is to:
A. Unify ESI from disparate sources into one format.
B. Make documents, searchable, and sortable.
C. Use analytics tools to enhance access to the Contant of the documents.
D. All of the above.
D. All of the above.
The process of removing exact copies of the same file or messages from a set of electronic documents, is known as ______
A. Keyword search.
B. Deduplication.
C. Culling
D. None of the above.
B. Deduplication.
One of the primary objectives, when processing ESI is to:
A. Determine which ESI is relevant.
B. Extract metadata and text from ESI.
C. Prepare ESI for technology assisted review.
D. Identify the sources of ESI.
B. Extract metadata and text from ESI.
The purpose of document review is to:
A. Identify documents that are relevant to the issues in the case.
B. Gather, important factual information needed in the case.
C. Identify privileged information.
D. All of the above.
D. All of the above.
True or False: During document review, documents are coded or tagged in order to organize and categorize documents based on the needs of the case
True
Privileged documents, need to be protected during document review because:
A. The attorney client privilege protects, confidential, lawyer, client communications.
B. Other parties are not entitled to discovery of privileged communications
C. Attorney work product can reflect, an attorney’s key strategy.
D. All of the above.
D. All of the above.
Technology assisted review (TAR) is:
A. As effective as human linear review in identifying relevant documents.
B. Saves time and money in the document review process.
C. Replaces all human review of documents.
D. It saves time and money and is effective as human linear review in identifying relevant documents.
D. It saves time and money and is effective as human linear review and identifying relevant documents.
All of the following are true about metadata, except:
A. It is the data about the document.
B. It is exempt from discovery.
C. It is part of every electronic document.
D. It is usually produced in a data. (.DAT) file.
B. It is exempt from discovery.
A ______ is a checklist that provides the details of the production, including the documents, to be produced, or the criteria for identifying the documents.
A. Production format.
B. Native file.
C. Load file.
D. Production specifications.
D. Production specifications.
Each of the following are typical forms in which documents are produced, except:
A. Native format.
B. Image format.
C. Paper format.
D. Executable format.
D. Executable format.
Place the five project management process groups in the correct sequential order.
Executing
Closing
Initiating
Monitoring and controlling
Planning
Initiating
Planning
Executing
Monitoring and controlling
Closing
Placed the five core ediscovery phrases in the correct sequential order
Process ESI
Collect ESI
Produce ESI
Identify and preserve ESI
Review and analyze ESI
Identify and preserve ESI
Collect ESI
Process ESI
Review and analyze ESI
Produce ESI
The following task must be completed during which phase of an a discovery process?
- Perform early data assessment and reporting
- Identify culling techniques, and determine if you will de-NIST the ESI
- prepare an exception report
A. Identification and preservation.
B. Processing of ESI.
C. Production of ESI.
D. Collection of ESI.
E. Document review.
B. Processing of ESI.
What is a work breakdown structure (WBS)?
A. It is the breakdown into phases of project tasks
B. It is used to prepare project cost estimates.
C. It helps to develop a Projects schedule.
D. All of the above.
D. All of the above.
True or false: identifying the scope, time, and cost of an E discovery project are critical to successful project outcomes
True
True or false: data protection laws are being enacted around the globe to protect against the unlawful use and processing of individuals personal information
True
All of the following are restrictions that limit cross-border transfers of ESI except:
A. Binding corporate rules.
B. Blocking statutes.
C. State secret laws.
D. Data privacy laws.
A. Binding corporate rules.