a
Menu
0

800-523-2319experts@tasanet.com

Articles

Wounds

TASA ID: 694

Wounds to the skin and deeper structures are among the most common of acute medical conditions.  Fortunately, most of these are minor injuries, and most of them resolve uneventfully when managed appropriately.  Many wounds; however, involve injuries that require skillful assessment to properly appreciate their magnitude, and many must be repaired skillfully to avoid long-term sequelae.

The Flaws of Using Search Methods in E-discovery

Whitepaper

TASA ID: 1793

Introduction


The document review industry has used search methods for various purposes. The use of search methods have been validated by using flawed validation methods. I could show the validation methods that have been used are flawed due to the interference of networked-based distributed review models on performance, reviewer qualification mismatches, using tag counts in validation methods, and the misuse of statistical methods. Statistical methods, which always involve using small probability theory to address low-frequency high-risk problems, are sufficient to make most search results invalid. The flaw in using statistical methods in litigation is similar to using the small probability theory to address risks in the aviation industry which would lead to hull losses.   

I conduct a brief analysis of two well known key search methods which have been used widely to generate document pools for human review. 


Causes of Inadvertent Disclosure of Privileged Documents and Strategies for Protecting Privileged Documents

Whitepaper

TASA ID: 1793

There is an inherent difficulty in keeping privileged documents and especially work product in e-discovery. This problem can cause the most serious damages to litigants, and consequences including anything from direct loss of cases to protracted procedural complications are reflected in a large number of cases. Each time when a privileged document is leaked, there is no real remedy. Clawing-back documents gives the producing party only a right to stop the receiving party from using the leaked documents directly. However, nothing can stop the receiving party from collecting information from other sources to strengthen its case by using the leaked documents as road maps. One should expect that the receiving party will keep copies of leaked documents for reference and may use them to cross-check anything affecting its case. Therefore, this problem must be addressed seriously. I will discuss what the main cause for the frequent leaking of privileged documents.

RSS
First4849505153555657Last

Theme picker

Categories

Loading
  • Let Us Find Your Expert

  • Note: This form is to be completed by legal and insurance professionals ONLY. If you are a party in a case that requires an expert witness, please have your attorney contact TASA at 800-523-2319.

Search Experts

TASA provides a variety of quality, independent experts who meet your case criteria. Search our extensive list of experts now.

Search Experts
b