Summary
The fog of war is apt shorthand for the state of uncertainty that exists early in a new legal matter. Whether you are gearing up for litigation, an agency enforcement action, or an investigation, you are faced with potential conflict and liability shrouded in a fog of uncertainty: What are the facts? What are the risks? What evidence exists, and what does it show? Early case assessment (ECA), fundamentally, is the process of trying to clear some of the fog of uncertainty around the answers to these questions and others like them. As litigation has evolved in the eDiscovery era, however, so too has the scope of what’s included in ECA.
Today the term encompasses three connected-but-distinct goals related to different areas of uncertainty, which can make the ECA phase of an eDiscovery effort a confusing one for practitioners. In this free Practice Guide, Consilio Director of Education Matthew Verga, Esq., reviews the fundamentals that legal practitioners need to know about performing effective ECA in the context of eDiscovery to help you see through the fog.
In this Practice Guide
- The Three Goals of ECA
- Available Tools and Techniques
- How to Align Your Approach with Your Goals
Key Insights
- How to Find What You Don’t Know to Seek
- How New Visualization Options Can Help
- How CAL Can Reveal the Right Things Quickly
Practice Guide Download
About the Author
From the author
Sampling Techniques for Litigation and Investigations
Despite years of discussion in the eDiscovery industry about the power and importance of sampling techniques – particularly in the context of technology-assisted review (TAR), many practitioners remain unfamiliar with what they can accomplish with them, and when, outside of TAR, they might do so.
Six Data Protection Strategies for Legal Teams: Mitigating Risk, Maintaining Reputation
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.