At JURISi, our business is information. We understand how important information is to your business. Since more than 98 percent of today’s information originates and is stored electronically, the consequences of electronic data permeates law in the form of digital evidence and business in the form of information management. Law and business also intersect in the form of regulations governing data retention, security and privacy.
The role of JURISi is to assist companies with their information management and to provide counsel with necessary legal support.
From our offices in Atlanta, GA, JURISi’s expert consultants serve clients and counsel nationwide to integrate technology with law and business.
- CT 743dd
- EU SAFEHARBOR
- ISO 27001/27002
- MA 201 CMR 17
- NV NRS 603A
- OR S.B. 583
- Affirmative Action Plans
- Compensation Analysis
- Diversity Strategies
- Employee Relations
- HR Management
- Training and Development
- Workplace Compliance
- Breach Response
- Digital Forensics
- Litigation Support
- Business Continuity
- Disaster Recovery
- Incident Response Plan
- Network Security
- Penetration Testing
- System Analysis
- Cyber Security
- Problem Solving
- DIGITAL FORENSICS
E-discovery is the disclosure of digital evidence to support a cause of action. It is a multi phased process that begins with the initial identification of Electronically Stored Information (ESI) and concludes with its final presentation at trial.
E-discovery is not a simple document swap like its paper counterpart. Consequently, e-discovery expertise is not measured by one’s proficiency at mimicking processes and procedures developed under the paper document paradigm that are poorly conceived and not well suited for digital data in the first place.
When it comes to digital evidence, we understand the technologies, the unique processes, the relationships between those processes and how they effect each stage of the e-discovery process through the complete litigation lifecycle that includes:
Since more than 98 percent of today’s data originates and is stored in electronic form, a computer forensic expert is essential for a variety of cost saving and technical advantages whether involved in litigation or simply managing day-to-day activities.
When the situation actually involves litigation, or even just the potential for litigation, a computer forensic expert is essential for a variety of evidential, procedural and economic reasons. In fact, in today’s digital world proceeding without a computer forensic expert is simply suicide.
Litigating without retaining a computer forensic expert is not a cost saving measure. Indeed, it is quite the opposite, since the in-expertise of other less knowledgeable counsel, paralegals and technology members will only compromise the evidence; wastefully consume litigation resources using inefficient or ineffective methods; or fall victim to clever data hiding techniques or intuitively appealing but erroneous claims by opposing counsel and their experts.
After all, only a computer forensic expert has the special training and expertise for:
- Managing the e-discovery process for the greatest economy and efficiency;
- Recognizing and designing methods for preserving, processing and producing discoverable Electronically Stored Information (ESI) in the best and most efficient manner;
- Locating key documents and artifacts more quickly and economically than other legal team members that are:
- less proficient in using automated tools or technology assisted review methods,
- may not even possess the powerful and specialized tools used by computer forensic experts; or
- prefer less outdated, impractical and inferior methods out of ignorance or a litigation business model that promotes inefficiency;
- Recognizing the significance of artifacts or trends that would go unnoticed by less knowledgeable litigation team members that may not know how to interpret the data or that the data even exists;
- Avoiding needless argument and related expense by exposing weaknesses in the opposition’s claims that are not supported in whole or in part by the evidence as a result of the procedures followed or the interpretation given to documents or artifacts on which the claims are based;
- Ensuring that ESI evidence is admissible because of familiarity and use of accepted collection and analysis procedures that are typically not practiced by client personnel; and
- Evaluating the breadth and scope of a matter where use of a computer is central to the event such as with purloined trade secrets, cyber harassment, computer assisted fraud, etc.
LEVEL 2 MONITORING (L2M) SERVICES
What Is L2M?
L2M is the process of investigation and reporting of compliance with dispute agreements, contracts, court orders, and other business and legal obligations that combines accounting, technology, legal knowledge and experience, and other appropriate disciplines.
Benefits of L2M:
- Faster and cheaper than litigation
- Performed by experienced neutrals and independent experts
- Applicable to court appointments, government orders, private party agreements, ongoing disputes and investigations
- Capabilities include cross functional or specific skill sets
- Parties and/or their counsel set their level of day-to-day involvement
L2M Services Provided:
Examples: Identify sales related to royalty payments, perform accountings, monitor sales and cash collections, monitor compliance with agreements
Examples: Detect identity, conduct, milestones; monitor data access, use, disclosure, compromise; evaluate online conduct; apply components of e-discovery; conduct predictive behavior analysis
Examples: Identify payments to related parties, determine whether project funds have been spent properly; investigate unauthorized use of trade secrets, trace assets
Examples: Analyze large data for conduct and compliance; E-discovery; investigate unauthorized conduct and non-compliance; protect trade secrets; monitor compliance with agreements
Examples: Monitor compliance with laws, regulations, orders, and other legal directives; preserve legal privileges; Prepare evidence; Satisfy record management duties
Particular Applicability to Disputes Involving:
- Business fraud, abuse and anticompetitive
- IT and large data analysis
- Intellectual Property – trade secrets, patents, non-competition, client solicitation, raiding
- Government investigation and regulatory compliance