News & Analysis as of

Confidential Information Evidence e-Discovery

Ankura

Cracking the Code: How AI is Revolutionizing Forensic Investigations

Ankura on

Picture this: A corporate investigator stares at a mountain of digital evidence—emails, chat logs, spreadsheets, and mobile device data. With a sigh, they prepare for weeks of painstaking manual review, knowing that the clock...more

Minerva26

Privilege Log, Privilege Log — It’s All About the Description

Minerva26 on

A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide