P.O. Box 19161 Atlanta, Georgia 31126



JURISi is the Law of Information

At JURISi, our business is information.  We understand how important information is to your business.  Since more than 98 percent of today’s information originates and is stored electronically, the consequences of electronic data permeates law in the form of digital evidence and business in the form of information management. Law and business also intersect in the form of regulations governing data retention, security and privacy.

The role of JURISi is to assist companies with their information management and to provide counsel with necessary legal support.

From our offices in Atlanta, GA, JURISi’s expert consultants serve clients and counsel nationwide to integrate technology with law and business.

  • CT 743dd
  • EEO-1
  • GLBA
  • ISO 27001/27002
  • MA 201 CMR 17
  • NV NRS 603A
  • OR S.B. 583
  • SOX

  • Affirmative Action Plans
  • Compensation Analysis
  • Crowd Work
  • Dispute Resolution
  • Diversity Strategies
  • Employee Relations
  • HR Management
  • Investigation
  • Problem Solving
  • Training and Development
  • Workplace Compliance

  • Breach Response
  • Causation Analysis
  • Digital Forensics
  • e-Discovery
  • Expert Witness
  • Investigation
  • Litigation Support
  • Monitoring

  • Audits
  • Business Continuity
  • Cyber Security
  • Disaster Recovery
  • Incident Response Plan
  • Network Security
  • Penetration Testing
  • Problem Solving
  • Risk Management
  • System Analysis

                                                                 OUR EXPERTS

Gene Caudle
Managing Partner of OneSourceHRM

Ashley Cloud
Director of Jurisi

Leslie Hutchinson
Causation Expert

Hermann Kelley
Director of Cyber Risk and Security

Ali Thiam
Director of Data Science

NOTICE: Change of mailing address – Effective August 1, 2017 the mailing address of JURISi Group will be
P.O. Box 19161
Atlanta, Georgia 31126



Contact us to find out more about how JURISi can help you.


E-discovery is the disclosure of digital evidence to support a cause of action. It is a multi phased process that begins with the initial identification of Electronically Stored Information (ESI) and concludes with its final presentation at trial.

E-discovery is not a simple document swap like its paper counterpart.  Consequently, e-discovery expertise is not measured by one’s proficiency at mimicking processes and procedures developed under the paper document paradigm that are poorly conceived and not well suited for digital data in the first place.

When it comes to digital evidence, we understand the technologies, the unique processes, the relationships between those processes and how they effect each stage of the e-discovery process through the complete litigation lifecycle that includes:


Manage ESI to mitigate risk and expense by preparing for e-discovery in advance


Preserve and protect ESI from inappropriate alteration or destruction


Reduce the volume of ESI to its most relevant level and then convert it, if necessary, to forms more suitable for review and analysis


Identify and locate potential sources of ESI and determining its scope, breadth and depth


Collect and gather ESI for further use in the e-discovery process


Reviewing ESI using the latest Technology Assisted Review (TAR) techniques that delivery the greatest economy and effectiveness to the document review process.

Since more than 98 percent of today’s data originates and is stored in electronic form, a computer forensic expert is essential for a variety of cost saving and technical advantages whether involved in litigation or simply managing day-to-day activities.

When the situation actually involves litigation, or even just the potential for litigation, a computer forensic expert is essential for a variety of evidential, procedural and economic reasons. In fact, in today’s digital world proceeding without a computer forensic expert is simply suicide.

Litigating without retaining a computer forensic expert is not a cost saving measure. Indeed, it is quite the opposite, since the in-expertise of other less knowledgeable counsel, paralegals and technology members will only compromise the evidence; wastefully consume litigation resources using inefficient or ineffective methods; or fall victim to clever data hiding techniques or intuitively appealing but erroneous claims by opposing counsel and their experts.

After all, only a computer forensic expert has the special training and expertise for:

  • Managing the e-discovery process for the greatest economy and efficiency;
  • Recognizing and designing methods for preserving, processing and producing discoverable Electronically Stored Information (ESI) in the best and most efficient manner;
  • Locating key documents and artifacts more quickly and economically than other legal team members that are:
    • less proficient in using automated tools or technology assisted review methods,
    • may not even possess the powerful and specialized tools used by computer forensic experts; or
    • prefer less outdated, impractical and inferior methods out of ignorance or a litigation business model that promotes inefficiency;
  • Recognizing the significance of artifacts or trends that would go unnoticed by less knowledgeable litigation team members that may not know how to interpret the data or that the data even exists;
  • Avoiding needless argument and related expense by exposing weaknesses in the opposition’s claims that are not supported in whole or in part by the evidence as a result of the procedures followed or the interpretation given to documents or artifacts on which the claims are based;
  • Ensuring that ESI evidence is admissible because of familiarity and use of accepted collection and analysis procedures that are typically not practiced by client personnel; and
  • Evaluating the breadth and scope of a matter where use of a computer is central to the event such as with purloined trade secrets, cyber harassment, computer assisted fraud, etc.


What Is L2M?

L2M is the process of investigation and reporting of compliance with dispute agreements, contracts, court orders, and other business and legal obligations that combines accounting, technology, legal knowledge and experience, and other appropriate disciplines.

Benefits of L2M:

  • Confidential
  • Faster and cheaper than litigation
  • Performed by experienced neutrals and independent experts
  • Applicable to court appointments, government orders, private party agreements, ongoing disputes and investigations
  • Capabilities include cross functional or specific skill sets
  • Parties and/or their counsel set their level of day-to-day involvement

L2M Services Provided:


Examples:  Identify sales related to royalty payments, perform accountings, monitor sales and cash collections, monitor compliance with agreements


Examples: Detect identity, conduct, milestones; monitor data access, use, disclosure, compromise; evaluate online conduct; apply components of e-discovery; conduct predictive behavior analysis

Forensic Accounting 

Examples:  Identify payments to related parties, determine whether project funds have been spent properly; investigate unauthorized use of trade secrets, trace assets

Forensic Data-IT

Examples:  Analyze large data for conduct and compliance; E-discovery; investigate unauthorized conduct and non-compliance; protect trade secrets; monitor compliance with agreements

Legal Oversight

Examples:  Monitor compliance with laws, regulations, orders, and other legal directives; preserve legal privileges; Prepare evidence; Satisfy record management duties

Particular Applicability to Disputes Involving:

  • Business fraud, abuse and anticompetitive
  • IT and large data analysis
  • Intellectual Property – trade secrets, patents, non-competition, client solicitation, raiding
  • Government investigation and regulatory compliance