http://chihjung.info/viewthread.php?tid=2266308&extra=


[ Follow Ups ] [ Post Followup ] [ St George Girls Class of '99 Discussion Board ]

Posted by markussimonetta187 on January 09, 19113 at 18:06:57:

In Reply to: kHdoicBmiw Web Site posted by Ruispcammam on June 30, 19112 at 23:24:58:

The Information Management Journal/September / October 2007- Todayีs explosion of electronic data, coupled with the December 2006 amendments to the Federal Rules of Civil Procedure (FRCP) concerning electronically stored information (ESI), requires information and legal professionals to expand their knowledge about handling electronic discovery. The recent changes to the FRCP include:* Definitions and safe harbor provisions for the routine alterations of electronic files during routine operations such as back ups [Amended Rule 37(f)]* Information about how to deal with data that is not reasonably accessible [Amended Rule 26(b)(2)(B)]* How to deal with inadvertently produced privileged material [Amended Rule 26(b)(5)]* ESI preservation responsibilities and the pre-trial conference. [Amended Rule 26(f)]* Electronic file production requests [Amended Rules 33(d), 34, 26(f)(3), 34(b)(iii)]There are many opinions about how ESI should be planned for, managed, organized, stored, and retrieved. Some of the available options are extremely costly in terms of their required financial and time commitments. Constantly changing technologies only add to the confusion. One area of confusion is the distinction between computer forensics and electronic discovery; there is a significant difference. These are described in the sidebar Computer Forensics vs. Electronic Discovery.Making the Right ChoicesSuccessfully responding to e-discovery within the constraints of the amended FRCP requires organizations to make many critical decisions that will affect the collection and processing of ESI.Processing ChoicesBecause of the volume of information available in even the smallest of collections, it becomes necessary to manage the process to control time and budget. The following questions need to be answered:1. Who are the key people?The people important to a case should be identified. These key individuals include not only executives, but also assistants and other support personnel from the technology, accounting, sales and marketing, operations, and human resources departments.2. Where are the files located?All the potential locations of electronic evidence should be identified. These include home computers and all computers that a key person would use elsewhere (such as a girlfriend or boyfriendีs home), cell phones, PDAs, Blackberries, and any other digital device that might be used. It is important to note that MP3 players, such as iPods, can also be used to store documents or important files.3. How can the collection be culled?Methods for limiting the number of files collected may include collecting only those in certain date ranges or only those containing selected key words or terms. This can be done either before or after an entire hard drive is collected forensically. Known file filtering can also reduce the collection by removing standard application files common to all computers (such as the Microsoft Windowsจ logo file).4. How should password-protected/encrypted files be handled?Encrypted files cannot be processed until the encryption is broken. In some instances, files with exact or similar names may be available without using passwords or encryption. File locations may also provide information about the value decryptions provide. Decryption may require significant time. Sometimes a password can be obtained simply by asking for it, so this should be the first step. If that fails, using a subpoena may be successful.5. How should duplicate and near-duplicate documents be handled?Electronic file collections almost always include duplicates. Multiple individuals may have the same e-mail, with the same attachments. Two or more people may have reviewed key documents, saving them on their hard drives during the process. In processing electronic collections, it is possible to identify exact duplicate files and limit the number of documents that require review.Identifying exact duplicates usually occurs during the phase in which the metadata is identified and extracted from the files. De-duping the collection will minimally delay the processing.Standard de-duping involves identifying files that are exact duplicates and eliminating them. If anything has changed within a document, including formatting such as a change of font, it is no longer an exact duplicate and is not de-duped.It is imperative that both sides of a case agree on what is meant by าde-duping.ำ Many electronic discovery systems literally delete the files so they are gone from the collection. The forensic tools used in law enforcement, however, usually do not delete the duplicates, but merely identify them for future use.Discussing this definition during the pre-trial conference to ensure that all sides of a case use the same definition is imperative to ensuring that there is not a discrepancy in the number of files that each side later has.A more significant portion of any collection will be าnear duplicates.ำ This includes files that have been significantly altered or contain only a portion of the main document. For some projects, the sheer file volume requires that near duplicates be identified and reviewed as a group. This significantly reduces review time and costs when compared to traditional linear review.Identifying near duplicates requires comparing each document to every other document or using sophisticated software applications that require additional processing time. This technology increases consistency of review categories, reducing the chance of near-duplicate documents being identified as both privileged and non-privileged.6. What form should the collection take?The new rules state that the parties will meet and determine the format in which they wish to receive electronic evidence. In the absence of an agreement, the format will be that าin which it is ordinarily maintainedำ or in a าreasonably usableำ format.The choices a legal team has include whether each side prefers to receive the electronic evidence in native file format, converted to TIF or PDF, or in some other form. Often, this will depend upon the teamีs standard litigation review system.Such systems handle both native and converted files, with or without associated metadata and full text. There are pros and cons for both options. Native files with extracted metadata reflect the exact original file; however, they cannot be Bates labeled, which is a technique to mark documents with a unique identification code as they are processed, and are subject to inadvertent change.Converting native files to TIF or PDF is time-consuming and is the most expensive task in electronic discovery. Because 60 to 80 percent of the files in a collection may be non-responsive or irrelevant, both the time and finances expended in conversion may be counter- productive.The best compromise involves receiving files in native format, reviewing them for relevancy, and choosing only those that may be produced or used extensively for conversion to image format.Managing the vast amount of electronic files for litigation requires preparation planning for the production, organization, and retrieval of pertinent and relevant documents and managing both cost and time budgets. Because every case presents unique circumstances, there are no absolute correct answers to the questions above. But a team that understands the choices and their ramifications is prepared to make the informed decisions that will result in the best possible outcomes for the case and the organization.
1. Before you write anything down define not what you want to say, but what your message must achieve. Keep that firmly in focus at all times and use it as the main goal for everything you write. Ask yourself “does this concept/approach /clever headline/earnest mission statement/ really help the message achieve its objectives?” If the honest answer is no, alter it or rethink it completely. 2. Identify your target audience and get to know them very well. No matter how beautifully structured your message is if it doesn’t take into account the real circumstances and needs of the audience, it won’t work. Align your message’s objectives with these circumstances and needs.3. Study the media you’ll be using; be aware of how people will receive your message and where your message will be competing for their attention, use your common sense and creativity to make it stand out in the crowd. (Or if the crowd’s too big, reconsider the choice of media if that’s within your power.)4. Now develop your message based on these issues, and add in the final magic ingredient … “what’s in it for them?” Successful business messages are always based on benefits for the target audience – either actual or implied. Ensure you know the difference between features and benefits, and how to convert features into benefits.5. Research the way your target audience speak and communicate, and phrase your message in their language – which may not necessarily be yours. Avoid corporate pomposity and unnecessary jargon. Talk to “you,” not some vague third party, and keep your English as simple as possible, especially when your message is going to people who originate from other cultures. 6. Traditional grammar and even spelling mostly have been thrown out of the window. However there are still a few grammar rules you need to follow if you don’t want your message to look amateurish. Your knowledge of the audience and how they communicate will dictate your writing style to a large extent. Don’t let catchwords, “internet-speak,” emoticons, etc. obscure your message or its benefits.7. Time pressures and the influence of the internet have made us into a world of browsers, even when we’re reading brochures and other print. Unless it’s very short organise your offline text so readers who are browsing get the key points very easily. Always separate technical detail and other lengthy data from the main text so readers aren’t obliged to plod through it unless they want to. 8. Never be tempted to transplant text written for print into an online environment. Online text is as different from offline text as a PC screen is from paper. Because reading from screens is so unfriendly, online text must be very short and crisp and must make it extremely easy for readers to absorb the key points. Don’t let web designers talk you into flamboyant graphics that could inadvertently swamp your message.9. When you give a speech, make sure you write it for yourself and your natural way of speaking – not your (or someone else’s) idea of how an important business person should speak in public. Use a tape recorder to get an objective view of your voice, style, weaknesses and strengths. Keep sentences short with only one idea in each. Avoid telling jokes unless you’re naturally funny. And rehearse, rehearse, rehearse.10. If you think you may be out of your depth with a business writing project (e.g. a TV commercial, major direct marketing campaign, complex video or business theatre script) you’re probably right – so call in a professional writer. Don’t risk embarrassing yourself or your organisation with an attempt that’s amateurish – there’s no shame in admitting you can’t be an expert at everything!

http://yrunindiana.com/forum/topic.php?id=154489&replies=1#post-159542
http://honeywiki.zavinagi.org/index.php/User:3979nijdhsc#Cheap_Eli_Manning_Elite_Jerseys_Cheap_Nike_NFL_Jerseys_batt
http://www.ipashow.com/viewthread.php?tid=1640538&extra=
http://preedem.com/profile_blogs/Ismael2845/&action=view&id=312284
http://starfish.multiling.com/wiki/index.php/User:Nidjshfdo6#cheap_nfl_women_jerseys_Cheap_nfl_nike_jerseys_wholesale__ma

10 ways to get links to your site
10 Ways to Manage Work Stress for Women

http://www.zuishax.com/forum.php?mod=viewthread&tid=1629282
http://old.noahedu.com/blog/space.php?uid=1291808&do=blog&id=2559055
http://www.law1949.com/forum.php?mod=viewthread&tid=2370440
http://test.yeswan.com/dx15/bbs/forum.php?mod=viewthread&tid=876232&extra=
http://yuanlimazu.com/viewthread.php?tid=590632&extra=



Follow Ups:



Post a Followup

Name:
E-Mail:

Subject:

Comments:

Optional Link URL:
Link Title:
Optional Image URL:


[ Follow Ups ] [ Post Followup ] [ St George Girls Class of '99 Discussion Board ]