AI in eDiscovery Today: An Open Conversation
Tenant Tales and Reseller Realities: Inside the FCRA Arena With Eric Ellman — FCRA Focus Podcast
Early Returns Podcast - Oliver Roberts: AI and the Law, and an Education
Driven by Data: Auto Finance Trends Uncovered - Moving the Metal: The Auto Finance Podcast
The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Innovations in Compliance: Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye
Early Days of the Trump Administration: Impact on the CFPB — The Consumer Finance Podcast
CFPB's Inquiry Into Payments Privacy — Payments Pros – The Payments Law Podcast
Innovation in Second Requests: Data is Your Greatest Asset
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
The Presumption of Innocence Podcast: Episode 48 - Digital Boundaries: Fourth Amendment Protections in a Connected World
eDiscovery Needs Digital Forensics for a Mobile World
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
EEO-1 Filing After June 4: What to Do Now, and How to Prepare for Next Year - Employment Law This Week®
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
The development and use of search terms in e-discovery is a cornerstone of modern litigation. Properly crafted search terms enable legal teams to efficiently identify relevant electronically stored information (“ESI”) while...more
Slack has transformed the way modern organizations communicate. Conversations that once happened over long email threads now take place in fast-moving channels, private messages, and quick back-and-forth threads. While this...more
ESI protocols have become an important tool for getting parties “on the same page” regarding how discovery will be conducted. While they aren’t necessarily appropriate for every case, they are a vital tool in helping to...more
Modern collaboration tools have changed the very definition of metadata—and antitrust litigators must evolve with it. From Slack threads to Google Doc revisions, today’s metadata challenges can derail discovery if not handled...more
Revealing Hidden Truths in History’s Most Complex Documents - The Kennedy assassination archives include thousands of historical records—many plagued by redactions, poor-quality scans, handwritten notes, and degraded...more
In In Re: Uber Technologies, Inc. Passenger Sexual Assault Litigation, 2025 WL 678543 (Mar. 3, 2025), the court issued another hyperlinked document discovery decision arising out of the parties’ ESI Protocol. While...more
When it comes to discovery of mobile devices, it’s not just the data that’s important for discovery, but also the data about the data – the metadata – that can be used to authenticate evidence, to determine whether the data...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of May 6-12. Here’s what’s...more
Over 200,000 companies use Zendesk to drive better customer experiences. Featuring a fully integrated ticketing system and generative AI-powered bots, Zendesk helps businesses automate and strengthen their support efforts...more
Currently, no means of cross platform email duplicate identification exists. The EDRM Message Identification Hash (MIH) Specification takes a simple but effective approach to cross-platform email duplicate identification...more
You are invited to join EDRM’s Email Duplicate Identification Global Project Team as they share how they have solved the painful and oftentimes expensive process of duplicate identification across emails processed by multiple...more
By using our smartphones, tablets and computers, we create and exchange a vast amount of electronic data every day, but what some may not know is that there is a whole other world of information hidden beneath the surface —...more
Welcome to another installment of “E-Discovery Gold Nuggets”, where ACEDS Kansas City Chapter Leader Daniel Gold’s LinkedIn video series is explored on the ACEDS blog. Gold, who is also Managing Director of E-Discovery...more
Typical Google Vault exports provide limited metadata and data files that are not properly formatted for ediscovery needs. Incomplete information can be problematic for review platforms and result in wasted time and effort...more
Organizations that use Google Workspace in business know that any content could be responsive to litigation or necessary for an internal investigation. While Google Vault may be considered “good enough” at preserving and...more
At Hanzo, we’ve focused on collaboration tools for the last few years—and, as it turns out, we weren’t a moment too soon. The upsurge in remote work due to the coronavirus pandemic means that more workers than ever are...more
The March sessions of Legalweek took place recently, and as with the February sessions, the virtual event struck a chord that reverberated deep from within the heart of a (hopefully) receding pandemic. However, the...more
Trent Livingston has been the CEO of ESI Analyst since 2018. Trent started his career as a software test engineer and developer at Microsoft before entering the eDiscovery marketplace in the early 2000s. He has since provided...more
The submission of digital evidence traditionally required a sponsoring witness—something that could be time-consuming and expensive. Thankfully, as more and more online content, such as social media posts and chats, play a...more
Technology competence is an ethical requirement in more than 40 states. Beyond Rule 1 Competence, knowing technology helps lawyers comply with the duty of confidentiality and other rules of professional conduct. For...more
In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In this article, we turn to the types of information you can expect to encounter with mobile devices and key considerations...more