Summary
In discovery specifically, and in legal practice generally, the role of electronically-stored information (ESI) and new technology has grown exponentially over the past decade, as new sources have proliferated, new tools have become normalized, and new communication channels have supplanted the old. As a result, it has become a practical reality that effective legal practice and effective discovery requires some level of technology literacy and competence. Since 2012, that practical reality has been slowly transforming into a formal requirement as more than three quarters of state bars have incorporated some form of technology competence requirement into their professional conduct rules. In this free Practice Guide, Consilio Director of Education Matthew Verga, Esq., reviews the ABA Model Rule change, discusses state variations on that model, and uses California’s approach as a guide to the duty of technology competence for eDiscovery.
In this Practice Guide
- ABA Model Rule Change
- State Adoption and Variations
- The California Approach
Key Insights
- The Nine Core Competencies to Fulfill the Duty
- The Critical Importance of Identification and Preservation
- The Role of Relevant Experts in Fulfilling the Duty
Practice Guide Download
About the Author
From the author
ED102 – In the Beginning: Identification and Preservation Fundamentals
Identification and preservation are the first and most fundamental phases of an electronic discovery effort. The duty of (identification and) preservation is a foundational concept in our legal system that grows out of the common law concept of “spoliation,” which is nearly 300 years old.
An Ounce of Prevention: Fundamentals of Data Protection
For legal practitioners, a commitment to data protection is a matter of ethical duty, legal and regulatory compliance, and fundamental responsibility to clients and stakeholders. Fulfilling that commitment requires consideration of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.