CaseFleet Terminology Flashcards

1
Q

The process of searching through the unused parts of a disk for files that haven’t been overwritten and recovering those files. Word to the wise: “deleted” does not mean gone – deleting a file usually just unlinks it from your computer’s file system. With the right software, the deleted files can usually be recovered.

A

Carving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A very handy agreement which states that if you accidentally give the other side your privileged documents, they have to give them back and can’t use them against you or claim they aren’t privileged anymore. There are no known reasons for not having ______ agreement, but there are very good reasons to have one in place. A serviceable _______ agreement can be written in one paragraph.

A

Clawback Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A sequence of numbers and letters that is essentially unique for each and every file in the world. Comes in several different flavors, including MD5 and SHA1. Extremely useful for finding duplicates, determining if someone has files they shouldn’t have, and identifying evidence.

A

Checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When the responding party forces the requesting party to pay for the costs of responding to certain discovery. Often a Solomonic remedy imposed by the Judge when one party is asking for too much but maybe shouldn’t be prevented outright from getting it. Under so-called American rules of discovery, ________ is unlikely to be applied to well-drafted and reasonable discovery requests.

A

Cost Shifting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Processing a large set of data and removing the junk data so that it’s easier to search and less expensive to host or transfer. It’s best for the parties to agree on the criteria that will be used to ___ the data.

A

Culling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A person who holds the any form of ediscovery.

A

Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A process that removes multiples copies of the same file from a set of files, leaving you with only one of the copies. This is helpful when you have to review a large number of files and you don’t want to waste your time going line-by-line through to files to see if they are the same.

A

Deduplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Means removing all the duplicates across the board.

A

Horizontal deduplication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Means keeping a copy of a duplicate if it belongs to a different custodian. With this process, if you have 9 custodians, what is the maximum number of copies of the same file you might have after deduplication?

A

9 copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

one way of culling data. one takes a huge list of checksums, for known junk files and removes any matching files from the data set. The ___ part derives from the _______ who, among other things, maintains the list of junk files.

A

DeNISTing, NIST, National Institute for Standards and Technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A process where the parties to litigation exchange electronic evidence. _____ has been the subject of much teeth-gnashing and hair pulling, with many lawyers and commentators complaining about its cost and difficulty, but e-discovery is inescapable unless the parties live in caves and do not use computers.

A

ediscovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A form of productivity wherein the _____ that hold discrete bits of information remain in place. Ex., an email when converted to a PDF doc. have the same status as any of the other text on the page. In contrast, when email is produced in a native or near-native format, the “to:” and “from:” fields retain their spec pal status, and it is possible to construct searches like ‘from:hook@bidness.com to crook@bidness.org subject:conspir!’ using a review platform. This can be very effective.

A

Fielded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic evidence can be “________” in multiple forms. For ex, if there is a Word file on your client’s laptop, and you need to produce it to another party, you have several choices: 1. you can copy the file to some sort of transfer media (thumb drive) to produce to an exact copy; 2. you can convert the file to PDF and produce the PDF file; 3. you can print the file to TIFF also produce a load file that contains searchable text. or 4. you can literally print the file out on a piece of paper using a printer and deliver a copy of the paper to the other party. There are pros and cons to each form of production. If you are billing hourly, the only known “pro” of option 4 (printing) is that it wastes a lot of paper, and often results in motion practice. For reasons that we do not comprehend, some attorneys are flustered by native production and instead choose to have files produced PDF. Recommendation: talk about the forms of production with your opposing counsel before discovery starts; if you are requesting evidence, tell the other party (in writing) the form of production that you want.

A

Forms of Production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A document provided to a custodian when litigation is on the horizon or already happening that instructs him or her how to avoid deleting or corrupting evidence. Sometimes ____________ letters confuse ordinary people by telling them things like “cease rotating backup tapes”. Ideally, a litigation hold should be readable and comprehensible by its target audience, and compliance with the hold should be monitored. Watch out for company-sponsored paper shredding or hard-drive dumping events.

A

Litigation Hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A special file that you get (or give) with other files that provides additional information about those files, such as the directories they came from, metadata not contained in the files themselves, Bates numbers corresponding to the files, and information about the requests to which the files are supposed to responsive. Even though load files are essentially “flat” - i.e., non-relational databases (like Excel files) – they appear in any number of bizarre proprietary formats. There is no agreed-upon standard for formatting load files, and unless one happens to own the same software that was used to generate the load file, viewing one can be a serious pain the the butt. If you don’t own the software that generated the load file, you may want to ask for a comma-delimited (CSV) file instead, which at least you can open in Excel.

A

Load File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A meeting (or phone call) at the beginning of a case for lawyers to talk about discovery and try to reach agreement on preliminary matters like forms of production and dates for depositions. Required in federal court. Most often the _______ is “phoned-in” both literally and figuratively, to the detriment of everyone involved. Best if counsel prepare beforehand, talk with their clients about e-discovery and the evidence that’s likely to be sought, and come with a game plan.

A

Meet & Confer

17
Q

Contextual information about computer files that helps explain how/when/where/why they were created. ______ can also prove that a piece of a evidence “is what it purports to be”. _______ comes in two main categories embedded metadata and system metadata. The handy thing about embedded metadata is that it travels with the file, so that if you copy the file to transfer media and give it to your opponent, it will still be there. In contrast, system metadata does not travel, and is therefore difficult to produce in discovery. Examples of system metadata are: directory paths, last-modified dates, and created dates. System metadata is often produced in load file that accompanies the discovery response.

“data about data”

A

Metadata

18
Q

A file that is in the form in which it was originally created. If the file started its life by someone opening Microsoft Word, typing something, and then hitting “save,” then the _____ file will have a “.doc” or “.docx” extension. The opposite of a native file is printing a “.doc” file to paper or to “virtual” paper –e.g., TIFF (see below) or PDF.

A

Native

19
Q

Functionally the same as native. Because some things can’t really be produced in the application that created them, then we call the next best thing near-native. An example is an email generated in Gmail.

A

Near Native

20
Q

Software for examining electronic evidence - either your own or the other side’s. Can be hosted in a “cloud” environment – in which case expect to pay by GB, and don’t say I didn’t warn you. Alternatively, software that runs on one’s desktop. Ranges from inexpensive to insanely expensive. More often the latter. We’re trying to change this.

A

Review Platform

21
Q

A letter or email to your adversary demanding that he or she keep evidence safe and prevent it from being destroyed. Sometimes critical to point to when seeking sanctions at a later date if the other side “lost” some evidence. _______________ are often widely over broad, but hey, how is the sender supposed to know what the receive has and doesn’t have?

A

Preservation Demand

22
Q

A super handy file format for wrapping up huge numbers of emails and attachments in a way that preserves their ability to be searched. We like ___. Ask for them, often.

A

PST

23
Q

Whoever came up with this term should be shot. It just means an agreement that you can sit with your opponent and look at certain documents in the same room to facilitate coming to some sort of agreement about what to do with them next. There could be some other provision like that you can’t tell the judge what you say. Frankly, I’ve never had occasion to use one of these, but I’m sure I wouldn’t call it a _________

A

Quick Peep Agreement

24
Q

taking the secret parts of a document and crossing them out with a black sharpie

A

Redaction

25
Q

The thing that runs your bank account, your email account, your smartphone app, your FB account, your doctor’s medical records system, and generally everything else in the world, including many of the things that are valuable in ediscovery. Learning a bit about them and their lingo - highly recommended.

A

Relational Database.

26
Q

The places where electronic evidence lives - computer disks, smart phones, thumb drives, Dropbox. Custodians seem to have them.

A

Sources

27
Q

An image file like JPEG, PNG, or GIF, except that it has almost no legitimate purpose for existing. In very backward, retrograde forms of ediscovery, native files are converted to TIFF images and produced as such, with a load file provided to make up for the fact that the TIFF conversion process strips out almost every useful piece of information contained in the original file! Responding parties: please stop giving us TIFFs. Producing parties: don’t accept TIFFS.

A

TIFF