PDFPrintEmailAdd to Personalized Information Packet

Information Governance and E-Discovery

Kramer Levin is thoroughly versed in the legal complexities and ambiguities of the rapidly changing fields of information governance and e-discovery. Our team includes a dedicated E-Discovery Counsel as well as litigation technology professionals who evaluate and deploy a constantly evolving set of technological and analytical tools. The group provides legal guidance to both lawyers within the firm and clients on information management and effective strategies and advocacy in the context of litigation, government and internal investigations, and business operations.

We have worked hand in hand with our clients in significant cases addressing e-discovery and information governance and are adept at meeting our clients’ e-discovery obligations while remaining sensitive to costs. Our lawyers assist clients from the first sign of litigation to determine the optimal strategy to deal with e-discovery requirements. We choose from an array of available technologies to select the right tools and can operate as a stand-alone e-discovery team or as a partner with our clients’ preferred vendors to accomplish each task most efficiently. Kramer Levin has established relationships with most of the leading vendors in the marketplace, which optimizes our ability to work seamlessly with them to meet our clients’ needs.

Our legal and technical experience extends to every aspect of information governance and electronic discovery, including:

  • Early case assessment
  • Document preservation and litigation hold requirements
  • Data and document collection, processing, use, retention and destruction
  • Technology-assisted document review and production
  • Predictive coding, sophisticated analytics and technology-assisted review
  • Privacy issues and data security
  • In-house training
  • Advocacy and litigation
  • Litigation technology and support

We also advise on and draft policies for clients regarding data management, document retention and security; emails, texts and social media use; and information sharing. Working closely with our Cybersecurity lawyers, we help establish breach prevention protocols, risk management strategies, and incident response plans.

>