Home » Corporate Counsel » Can you Answer these 10 Basic eDiscovery Questions?

Can you Answer these 10 Basic eDiscovery Questions?

10 Basic eDiscovery Questions

Note: The following is a guest post from Daryn Teague, who provides support to the litigation software product line within the LexisNexis software division.

If you work in the litigation field, you’ve probably read articles, attended conference sessions, perused blogs and maybe even waded through entire books dedicated to educating you about the world of eDiscovery. Are you curious to see how much of that information you’ve retained?

Michael W. Mallory, Esq., who coordinates the delivery of LexisNexis eDiscovery and litigation technology to law firms in the Potomac region, hosted a CLE Webinar last week in which he helped litigation professionals connect the dots with eDiscovery. After walking participants through the basics of eDiscovery and the individual components of the Electronic Discovery Reference Model (EDRM), Mallory invited them to take a quiz regarding their knowledge of the subject.

Take this quiz for yourself and see how you do:

1. Place these in order of smallest to largest amount of data: (a) Petabyte; (b) Megabyte; (c) Terabyte; (d) Gigabyte.

2. The NIST list: (a) refers to data from the National Software Reference Library; (b) assists in the production of eDiscovery; (c) is a log generated when emails from the same string are clustered together; (d) occurs in the analysis stage of the EDRM.

3. An “.exe” is a program file that doesn’t contain relevant data: (a) True; (b) False.

4. The best use of deduplication is: (a) prior to production; (b) prior to processing; (c) prior to review; (d) prior to collection in order to have each records custodian give you only one copy.

5. Processing typically involves which of the following: (a) extracting text and metadata; (b) tagging; (c) creating image files; (d) culling to reduce the amount of data reviewed; (e) both a and c.

6. Hashing refers to: (a) a process of scrambling a file for encryption; (b) a process for calculating a unique ID for a document; (c) the process of cracking a password on an encrypted file; (d) the clustering of similar emails from the same string or conversation.

7. SHA-1 hash values: (a) are the informal industry standard; (b) ignore capitalization; (c) are highly unlikely to be the same for two different files; (d) are less reliable than MD5; (e) c and d.

8. Deduplicating the entire data collection: (a) is not a Best Practice – deduping is always done on a custodian level; (b) decreases the risk of inconsistent review decisions; (c) increases confidentiality by lowering the number of people likely to have access to the records; (d) reduces review time and expense; (e) b, c and d.

9. Which of the following is not typically done as part of document review: (a) tagging; (b) culling; (c) searching; (d) redacting.

10. Which of the following is likely to be allowed in applications for costs: (a) cost of printing documents for review; (b) cost of scanning and OCR’ing documents after they have been reduced to paper; (d) cost of printing documents for production; (d) none of the above.

Now take a look at the answers below and give yourself a grade. If you feel like you could use a brush-up on connecting the eDiscovery dots, you can watch a recording of the webinar at your convenience.

Additional eDiscovery webinars slotted for later in October include:

* * *


  1. b; d; c; a
  2. a
  3. b
  4. b
  5. e
  6. b
  7. c
  8. e
  9. b
  10. d

If you enjoyed this post, you might also like:
Devil is in the Data and 20 Other Must-Read eDiscovery Articles

Photo credit: Flickr, Kevin Dooley, Question (CC BY 2.0)

Facebook Twitter Pinterest Plusone Linkedin Digg Delicious Reddit Stumbleupon Tumblr Posterous Email Snailmail

About Contributing Writer

Contributing Writer
This bio page is used to publish submissions by contributing writers. We welcome contributions from the legal community and are especially keen for contributions from our customers. Please review previous submissions published here and the “About Us” section to get a sense for what topics work for this blog. All posts must be original content not published elsewhere for at least 30 days. To submit an idea for consideration, please email blsssocial@lexisnexis.com.