Judge Xavier Rodriguez on Possession, Custody, or Control from the Meet and Confer Podcast
Key Discovery Points: ESI Protocol Objection Denial Party
Key Discovery Points: Be a Team Player When It Comes to Production
From OCR to AI The Future of Media and Image Analysis in eDiscovery
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
Understanding Discovery in Commercial Litigation
Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
Key Discovery Points: Be Willing to Agree and Compromise When It Comes to Hyperlinks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Key Discovery Points: Don’t Rush in as an AI Fool!
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Brooklyn District Attorney Eric Gonzalez – Innovative Approach to Safety
Key Discovery Points: Timing is Mostly Everything in eDiscovery
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
What are Some of the Concerns With Applying AI to Document Review?
Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more
When there is potentially crucial evidence on a computer or device once controlled by the opposing party, an ex-employee plaintiff, or someone suspected to have stolen trade secrets we want to track it down as soon as...more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
Every version of Microsoft Windows brings along improvements in speed, performance, and visuals. Additional “under the hood” elements continue to be introduced that assist in digital forensic investigations. With Windows...more
2020 has been a year of significant change and adjustment, to say the least: the changes that the WFH era has inflicted on data management; the uptick in litigation across the board; layoffs, budget cuts, and the need to do...more
Is that document authentic? When was that photo actually taken? Who is the real owner of that file? Where did that email come from? The tools and techniques used by Digital Forensics experts answer these questions, and more....more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
Widely-available digital tools have made it easier than ever for individuals to fabricate and alter digital evidence. Forensic experts and skilled trial attorneys will discuss how to spot suspicious electronic evidence;...more