- 3 Pitfalls to Avoid: How Law Firms are Navigating Cybersecurity Questionnaires from Insurance Carriers and Clients
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Best Practices in Client Intake Process & Conflict Checks
- Best Practices in eBilling Appeal Process for Law Firms
- Calendar
- Careers
- Client Training Videos
- Cloud Technology and Legal Trends: A Roadmap for Modernizing Law Firms
- Contact
- Contact Thank You
- Cyber Security Risk Assessment
- Cyber Security Risk Assessment
- Cybersecurity
- Cybersecurity in Dallas
- Cybersecurity in Houston
- Cybersecurity Strategies & Resources for Law Firm IT Managers & Directors
- eBilling
- eBilling in Dallas
- eBilling in Houston
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT & Financial Managed Services
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- IT Managed Services – Dallas
- IT Managed Services – Houston
- IT Managed Services in Dallas
- IT Managed Services in Houston
- Law Firms and AI: Navigating New Frontiers in Legal Technology
- Litigation Services
- Login
- MITS
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Three Critical Gaps in Your Law Firm’s Staff Cybersecurity Training: Are You Covered?
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
- 3 Pitfalls to Avoid: How Law Firms are Navigating Cybersecurity Questionnaires from Insurance Carriers and Clients
- 5 Security Measures Law Firms Must Have
- About Frontline
- Admin Training Videos
- Administrative Managed Services
- Application & Technologies
- Arctic Wolf
- Baseline Assessment Review
- Best Practices in Client Intake Process & Conflict Checks
- Best Practices in eBilling Appeal Process for Law Firms
- Calendar
- Careers
- Client Training Videos
- Cloud Technology and Legal Trends: A Roadmap for Modernizing Law Firms
- Contact
- Contact Thank You
- Cyber Security Risk Assessment
- Cyber Security Risk Assessment
- Cybersecurity
- Cybersecurity in Dallas
- Cybersecurity in Houston
- Cybersecurity Strategies & Resources for Law Firm IT Managers & Directors
- eBilling
- eBilling in Dallas
- eBilling in Houston
- Events
- Financial Managed Services
- Frontline Home
- Frontline Home
- Insights
- IQTrack
- iRIS
- IT & Financial Managed Services
- IT Managed Services
- App Development for Law Firms | Frontline Managed Services
- Cybersecurity Services for Law Firms | Frontline Managed Services
- Help Desk
- IT Administration Services for Law Firms | Frontline Managed Services
- IT Engineering Services for Law Firms | Frontline Managed Services
- IT Legal Operations Powered by ServiceNow
- Managed IT Services Solutions
- Network Monitoring Services for Law Firms | Frontline Managed Services
- IT Managed Services – Dallas
- IT Managed Services – Houston
- IT Managed Services in Dallas
- IT Managed Services in Houston
- Law Firms and AI: Navigating New Frontiers in Legal Technology
- Litigation Services
- Login
- MITS
- Press
- Privacy Policy
- Safeguard Your Law Firm: Key Steps for Law Firms to Implement and Maintain Effective Security Policies
- Skillbuilder
- System Status
- Three Critical Gaps in Your Law Firm’s Staff Cybersecurity Training: Are You Covered?
- Webinars
- #5823 (no title)
- 4 Ways Law Firms are Saving Billable Time and Increasing Cash Flow Through Automation
- 8 Critical Aspects of Cybersecurity Training for New Law Firm Employees
- 8 Phishing Strategies Hackers Use to Infiltrate Your Law Firm
- Effective eBilling Solutions for Law Firms
- Increase Profitability and Free Up Billable Time by Optimizing Your Cash Cycle
- Is Your Backup Protecting Your Firm’s Data? 4 Critical Aspects of a Successful Disaster Recovery Plan
- Legal Cybersecurity: How to Protect Your Firm Against Rising Threats
- Looking Ahead While Looking Back: Best Practices Road Map for A/R in 2023
- Maintaining A/R Stability During Crisis Instability
- Mobile Devices & Social Media – Discovery Considerations for ESI Preservations
- Optimizing the Client Intake to Cash Process: Best Practices to Maximize Firm Profits
- People, Process, and Technology in a Work from Home Environment
- Ransomware Realities
- Secure Your Firm’s Data
- Security Resource Constraint – A Modern Problem for Legal Presented by Frontline Managed Services & Arctic Wolf
- Virtual Lunch & Learn: Top Tools Law Firms Can Leverage to Work Seamlessly From Anywhere
When Discovery Services Goes Wrong: The Alex Jones’ Trial
Attorneys have a professional duty to help represent their clients and protect their best interests through their legal engagement. The discovery phase is an integral part of the legal process. The duty of the legal professionals to protect their client’s sensitive data as well as effectively responding to the requests imposed on them.
In the case of Alex Jones’ defamation trial, it has been noted the entire contents of his cell phone were turned over to Plaintiff’s counsel. When Mr. Jones’ legal team was notified of this potentially inadvertent disclosure, no sign of demand was issued to Plaintiff’s counsel from his attorneys to help protect Defendant. So, what went wrong? What should have been the methods taken to help prevent such erroneous handling of this discovery phase?
Keep the Following Discovery Service Principles in Mind
There are multiple options available when collecting and producing mobile device data. Regardless of the methods used, some of the following considerations should be taken when handling your own discovery requests.
- Mobile devices are very intricate pieces of technology that many of us use, but few adequately understand the scope of their capabilities. When handling mobile device data, retaining an expert is key when preserving, reviewing, and producing that data, especially in the discovery phase.
- Very few discovery requests will result in the production of an entire device. There are a plethora of options available to respondents of discovery requests to cull down and review their data set for responsive data. Unless the request is all-inclusive, and a privilege review has been performed to identify items to be withheld, there is little if any reason why a full device’s data set should ever be produced.
- Keyword searching and date filtering are methods experts and legal professionals alike can use to narrow their clients’ data productions. Whether that data is in a review platform, or is being reviewed in an alternative program, these robust features are available to professionals to assist their review.
- When an initial review has been completed, a quality check of the production is an absolute must. You want to ensure the processes and procedures are correct and lead to a final product that meets the discovery burden and abides by all legal standards. Even with the use of technology to execute these processes, some measure of attorney-guided review of the final product should be performed.
This begs the question, with a variety of options available to legal and technical professionals alike, what went wrong in Mr. Jones’ case? How could such an egregious oversight of professional responsibility take place? While the jury may be out on that, always ensure you’re working with the appropriate technical professionals to help ensure your discovery is handled with the utmost care.