When a client brings you a litigation matter, the email record is usually where the real story lives. It's also where small firms quietly lose hours they'll never bill back.
Enterprise eDiscovery platforms like Relativity, Nuix, and Logikcull are purpose-built for large-scale document review. They're priced accordingly. A five-attorney firm handling employment disputes, contract litigation, or commercial matters doesn't need to review two million documents, and it definitely doesn't have the IT team to stand up an enterprise platform to handle two thousand of them.
This guide is for the firms in between: small practices with real email discovery obligations that need a defensible, practical process without enterprise software or an outside vendor on every case.
What Email Discovery Actually Means for Small Firms
In large-firm parlance, eDiscovery is a formal, technology-assisted process of identifying, preserving, collecting, processing, reviewing, and producing electronically stored information (ESI). The EDRM model lays out seven stages, each with its own workflows, tools, and specialists.
For small firms, the reality is simpler, though not necessarily easier. In practice, email discovery for a small law firm usually means four things:
- Figuring out which emails are relevant to the matter
- Collecting them without destroying their evidential value
- Reviewing them for privilege and responsiveness
- Producing them in a format opposing counsel and the court will accept
The challenge is not the conceptual framework. It is execution on a shoestring, often without paralegals trained in ESI protocol or an IT contact who knows what IMAP is.
The Legal Obligations You Cannot Ignore
Under the Federal Rules of Civil Procedure, and most state analogs, litigants have affirmative obligations to preserve and produce ESI once litigation is "reasonably anticipated." For email, that means a few things that catch small firms off guard.
The preservation duty attaches early. You do not need a complaint or even a demand letter. If your client could reasonably foresee litigation, the obligation to preserve is already live.
Spoliation has real consequences. Courts have discretion to impose sanctions ranging from adverse inference instructions to case-dispositive sanctions when ESI is lost or destroyed after the preservation duty attaches. For small firms, one spoliation ruling can tank a case and create malpractice exposure.
Format matters. Under FRCP 34(b)(2)(E), parties must produce ESI in the form it is ordinarily maintained or in a reasonably usable form. Producing emails as disorganized screenshots when you had direct mailbox access is a problem. Metadata matters. Courts have said so repeatedly.
None of this requires enterprise software. It does require a consistent process.
Step 1: Issue a Litigation Hold Right Away
The first action in any matter with email discovery implications is a litigation hold: a written notice to your client, and where applicable their employees, instructing them to preserve all potentially relevant documents, including email.
A solid litigation hold does the following:
- Goes out in writing (email works, but keep a copy)
- Specifies the scope: subject matter, date range, and which custodians are covered
- Gives concrete instructions: do not delete email, do not empty the trash, do not disable archiving
- Asks the client to turn off any automatic email deletion policies that might be running on their server
- Gets acknowledged in writing by the people receiving it
That last item is worth emphasizing for small business clients. Many companies have auto-delete policies set on Exchange or Google Workspace mailboxes, often configured by an IT vendor years ago and long forgotten, that will happily delete emails older than 90 or 180 days. If your hold does not address this explicitly, you have a gap.
Keep the hold notice and acknowledgment in your matter file. If spoliation is ever alleged, this documentation is your first line of defense.
Step 2: Map the Custodians Before You Touch Any Email
Email discovery starts with people, not inboxes. Before looking at a single message, map out who the relevant custodians are: the individuals most likely to have email that matters to this case.
In a wrongful termination case, that typically means the terminated employee, their manager, an HR business partner, and whoever made the final call. In a breach of contract dispute, it is usually the people who negotiated, executed, and performed under the contract.
For each custodian, you need to know:
- Their corporate email address and any aliases
- Whether they used personal email for work communications (common, legally significant, and often inconvenient for everyone)
- What platform they used: Microsoft 365, Google Workspace, on-premise Exchange, or something older
- Whether relevant emails exist on mobile devices that may not be fully synced to the server
This custodian map is your discovery scope. Update it as facts develop. It is common to expand the list once you start seeing what is actually in the mailboxes.
Step 3: Collect from the Original Source
This is where small firms most often go wrong. They ask clients to forward the relevant emails.
Do not do this. Forwarding is a terrible collection method for several reasons.
It loses metadata. Forwarded messages frequently display the current timestamp rather than the original send time, which can make a critical sequence of events look completely different than it actually was.
It truncates routing headers. Full header information, which matters in authenticity disputes, is usually dropped.
It misses attachments that were not included in the forward.
Most importantly, it hands the client control over what gets collected. The client decides what is relevant. That is not how discovery is supposed to work.
The right approach is direct IMAP access to the original mailbox. IMAP is the standard protocol for remote mailbox access, and every major platform supports it: Microsoft 365, Google Workspace, standard Outlook, Yahoo. With IMAP access you get original emails with headers intact, the ability to search by sender, recipient, date range, and keyword, and access to all folders including Sent, Drafts, and Deleted Items.
Getting IMAP credentials is usually straightforward. Ask the client, or if you are working inside a company, have an IT administrator enable it for the relevant accounts.
For PST files (the archive format Outlook uses), the same principle applies. Work from the original file, not from a selective export the client ran themselves.
Step 4: Search With Defined Criteria, Not Intuition
Once you have mailbox access, resist the urge to grab everything. Over-collection creates its own problems: slower review, greater risk of inadvertent privilege disclosure, and potential proportionality objections under FRCP 26(b)(1).
Define your search criteria before you start:
- Date range: When did the relevant events occur? Add a reasonable buffer on both ends.
- Custodians: Which accounts are in scope?
- Keywords: What terms are likely to appear in relevant emails? Be specific enough to filter noise, but not so narrow you miss variations.
- Parties: Emails to or from specific addresses (the opposing party, key witnesses) are often presumptively relevant.
Document what you searched and why. If your production is challenged, you need to show a principled methodology. "I looked through everything that seemed important" is not a methodology.
Step 5: Review for Privilege Before Anything Goes Out
Every batch of collected emails needs a privilege review before production. The key categories:
Attorney-client privilege covers communications between the client and counsel for the purpose of seeking or providing legal advice. The common mistake is assuming that any email involving an attorney is privileged. Emails copying attorneys on business decisions, transmitting non-privileged documents, or involving attorneys acting in non-legal roles generally are not.
Work product doctrine protects materials prepared in anticipation of litigation, including attorney notes, draft chronologies, and strategic communications. This is distinct from attorney-client privilege and has different scope and different exceptions.
Third-party communications can complicate things. Emails that include outside advisors, accountants, or consultants may break privilege depending on jurisdiction and context. Flag them and look at each one carefully.
When in doubt, withhold and log it. Producing privileged communications inadvertently can result in waiver. A clean privilege log is much easier to defend than a botched production.
Step 6: Produce in a Format the Other Side Can Actually Use
Small firm productions do not require litigation support vendors, but they do require attention to format.
PDF with metadata preserved works for most small-scale productions. Convert each email to PDF with header information intact, then Bates-stamp the pages.
Native format (.eml or .msg files) is sometimes required by the request or the court. It preserves all metadata but requires the receiving party to have software that can open the files.
Searchable PDF is preferable to image-only PDFs. Scanned or image-based PDFs cannot be text-searched, which creates unnecessary friction for opposing counsel reviewing the production.
Include a cover letter that specifies what you are producing, the methodology used to collect and review it, any categories withheld and the legal basis, and any known limitations on the collection.
The Real Cost: Your Time
The no-budget approach to email discovery is not actually free. It trades money for time. Pulling emails via IMAP, sorting them chronologically, reviewing for privilege, and formatting for production is a multi-hour process even for contained matters. For busy litigators, it is often longer than that.
For firms that handle several litigated matters per year, this adds up. A paralegal spending two days building an email chronology for every case is not spending those days on anything else.
ThreadLine was built for exactly this gap: the space between doing it all by hand and paying for an enterprise eDiscovery platform. Connect the relevant mailboxes via IMAP, define the scope, and ThreadLine generates a complete, court-ready chronological timeline in minutes. The output is a PDF or a secure, time-limited shareable link. All data is encrypted at rest with AES-256. Shared links expire automatically.
Your first timeline is free at threadline.app, no credit card required.
The Short Version
Email discovery for small law firms does not require enterprise software. It requires a repeatable process: get the litigation hold out early, map your custodians, collect from the original source rather than forwarded copies, define your search criteria before you start, review for privilege, and produce in a usable format.
The consequences of getting it wrong are real. The mechanics of getting it right are accessible to any firm willing to be consistent about it.