SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Background to Electronic Data Discovery (EDD) Michael Hamilton 2006/07
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discoverability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Admissibility – Electronic Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discovery Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sanctions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cost Shifting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privilege and Confidentiality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recent Cases ,[object Object],[object Object],[object Object],[object Object]
More Recent Cases ,[object Object],[object Object],[object Object],[object Object]
Hot Topics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use and Abuse of File Deletion Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Tapes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Tapes ,[object Object],[object Object],[object Object],[object Object],[object Object]
Court Rules ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
New Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallCardinaleWay Mazda
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeBoyarMiller
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersBoyarMiller
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.Bill Daniels
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesCESSDA Training
 
The Importance of Good Plumbing for Collaborative Research Data
The Importance of Good Plumbing for Collaborative Research Data The Importance of Good Plumbing for Collaborative Research Data
The Importance of Good Plumbing for Collaborative Research Data ARDC
 
e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?Keisha-Ann Thompson
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Seth Row
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in EdiscoveryJosh Kubicki
 
Software Patents: Trolls and Other Bullies (LCA 2105)
Software Patents: Trolls and Other Bullies (LCA 2105)Software Patents: Trolls and Other Bullies (LCA 2105)
Software Patents: Trolls and Other Bullies (LCA 2105)freedeb
 
Litigation Holds: A primer
Litigation Holds: A primerLitigation Holds: A primer
Litigation Holds: A primerDebbie Westwood
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalAubrey Owens
 
CMCP: The Price and Perils of E-Discovery
CMCP: The Price and Perils of E-DiscoveryCMCP: The Price and Perils of E-Discovery
CMCP: The Price and Perils of E-DiscoveryAlex Ponce de Leon
 
In-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementIn-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementTim Hsieh
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowEd Sothcott
 
eDiscovery Case Law & Trends - My ALM Law Tech Conference
eDiscovery Case Law & Trends - My ALM Law Tech ConferenceeDiscovery Case Law & Trends - My ALM Law Tech Conference
eDiscovery Case Law & Trends - My ALM Law Tech ConferenceDaniel Gold, Esq.
 

Tendances (19)

What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation Prall
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
 
Class Action Seminar.
Class Action Seminar.Class Action Seminar.
Class Action Seminar.
 
A Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use LicensesA Look at CESSDA and Data Re-use Licenses
A Look at CESSDA and Data Re-use Licenses
 
The Importance of Good Plumbing for Collaborative Research Data
The Importance of Good Plumbing for Collaborative Research Data The Importance of Good Plumbing for Collaborative Research Data
The Importance of Good Plumbing for Collaborative Research Data
 
e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?e-Discovery: A case for amendments to civil procedure rules ?
e-Discovery: A case for amendments to civil procedure rules ?
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
Powerpoint For Delete! Litigation Risk Management Seminars, H&K Llp, Fall 2008
 
Proportionality in Ediscovery
Proportionality in EdiscoveryProportionality in Ediscovery
Proportionality in Ediscovery
 
F1805023942
F1805023942F1805023942
F1805023942
 
Daniel day
Daniel dayDaniel day
Daniel day
 
Software Patents: Trolls and Other Bullies (LCA 2105)
Software Patents: Trolls and Other Bullies (LCA 2105)Software Patents: Trolls and Other Bullies (LCA 2105)
Software Patents: Trolls and Other Bullies (LCA 2105)
 
Litigation Holds: A primer
Litigation Holds: A primerLitigation Holds: A primer
Litigation Holds: A primer
 
Legal Technology 2011 and the Paralegal
Legal Technology 2011 and the ParalegalLegal Technology 2011 and the Paralegal
Legal Technology 2011 and the Paralegal
 
CMCP: The Price and Perils of E-Discovery
CMCP: The Price and Perils of E-DiscoveryCMCP: The Price and Perils of E-Discovery
CMCP: The Price and Perils of E-Discovery
 
In-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent InfringementIn-House Counsel's Role in Avoiding Willful Patent Infringement
In-House Counsel's Role in Avoiding Willful Patent Infringement
 
Electronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to KnowElectronic Discovery - GODWIN PC - What you Need to Know
Electronic Discovery - GODWIN PC - What you Need to Know
 
eDiscovery Case Law & Trends - My ALM Law Tech Conference
eDiscovery Case Law & Trends - My ALM Law Tech ConferenceeDiscovery Case Law & Trends - My ALM Law Tech Conference
eDiscovery Case Law & Trends - My ALM Law Tech Conference
 

En vedette

michael hamilton legal consulting handling transcripts
michael hamilton legal consulting handling transcriptsmichael hamilton legal consulting handling transcripts
michael hamilton legal consulting handling transcriptsmichaelhamilton
 
michael hamilton marketing initiative
michael hamilton marketing initiativemichael hamilton marketing initiative
michael hamilton marketing initiativemichaelhamilton
 
michael hamilton legal database design presentation 3 new york
michael hamilton legal database design presentation 3 new yorkmichael hamilton legal database design presentation 3 new york
michael hamilton legal database design presentation 3 new yorkmichaelhamilton
 
background to electronic data discovery
background to electronic data discoverybackground to electronic data discovery
background to electronic data discoverymichaelhamilton
 
Το πιο γλυκό ψωμί
Το πιο γλυκό ψωμίΤο πιο γλυκό ψωμί
Το πιο γλυκό ψωμίEvangelia Patera
 
michael hamilton legal project management
michael hamilton legal project managementmichael hamilton legal project management
michael hamilton legal project managementmichaelhamilton
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

En vedette (7)

michael hamilton legal consulting handling transcripts
michael hamilton legal consulting handling transcriptsmichael hamilton legal consulting handling transcripts
michael hamilton legal consulting handling transcripts
 
michael hamilton marketing initiative
michael hamilton marketing initiativemichael hamilton marketing initiative
michael hamilton marketing initiative
 
michael hamilton legal database design presentation 3 new york
michael hamilton legal database design presentation 3 new yorkmichael hamilton legal database design presentation 3 new york
michael hamilton legal database design presentation 3 new york
 
background to electronic data discovery
background to electronic data discoverybackground to electronic data discovery
background to electronic data discovery
 
Το πιο γλυκό ψωμί
Το πιο γλυκό ψωμίΤο πιο γλυκό ψωμί
Το πιο γλυκό ψωμί
 
michael hamilton legal project management
michael hamilton legal project managementmichael hamilton legal project management
michael hamilton legal project management
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similaire à michael hamilton startegic dm case team

Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentationscubastog
 
Sound E-Discovery Collection Practices
Sound E-Discovery Collection PracticesSound E-Discovery Collection Practices
Sound E-Discovery Collection PracticesSeth Row
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentationjvanacour
 
Nra
NraNra
NraCTIN
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?CallPM
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recoverymylespilkington
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 
Ctin Ediscovery
Ctin EdiscoveryCtin Ediscovery
Ctin EdiscoveryCTIN
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competencejcassd619
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesCSCJournals
 
DBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby DrakeDBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby DrakeKlemchuk LLP
 
08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breachesacfesj
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalAubrey Owens
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And DiscoveryRonald Coleman
 

Similaire à michael hamilton startegic dm case team (20)

Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
Sound E-Discovery Collection Practices
Sound E-Discovery Collection PracticesSound E-Discovery Collection Practices
Sound E-Discovery Collection Practices
 
10probs.ppt
10probs.ppt10probs.ppt
10probs.ppt
 
E Discovery General E Discovery Presentation
E Discovery General E Discovery PresentationE Discovery General E Discovery Presentation
E Discovery General E Discovery Presentation
 
Nra
NraNra
Nra
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
E Discovery
E DiscoveryE Discovery
E Discovery
 
An Introduction to Asset Recovery
An Introduction to Asset RecoveryAn Introduction to Asset Recovery
An Introduction to Asset Recovery
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Ctin Ediscovery
Ctin EdiscoveryCtin Ediscovery
Ctin Ediscovery
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Law, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-CompetenceLaw, Ethics & Technology: e-Discovery and e-Competence
Law, Ethics & Technology: e-Discovery and e-Competence
 
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesA Survey of Security and Forensic Features In Popular eDiscovery Software Suites
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
DBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby DrakeDBA Presentation On E-Discovery by Kirby Drake
DBA Presentation On E-Discovery by Kirby Drake
 
Forensic data investigations in China
Forensic data investigations in ChinaForensic data investigations in China
Forensic data investigations in China
 
08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches
 
Surviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The ParalegalSurviving Technology 2009 & The Paralegal
Surviving Technology 2009 & The Paralegal
 
Electronic Document Management And Discovery
Electronic Document Management And DiscoveryElectronic Document Management And Discovery
Electronic Document Management And Discovery
 

Dernier

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 

Dernier (20)

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 

michael hamilton startegic dm case team

  • 1. Background to Electronic Data Discovery (EDD) Michael Hamilton 2006/07
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.