Judge Xavier Rodriguez on Possession, Custody, or Control from the Meet and Confer Podcast
Key Discovery Points: ESI Protocol Objection Denial Party
Law School Toolbox Podcast Episode 514: Listen and Learn -- Discovery (Civ Pro)
Key Discovery Points: Be a Team Player When It Comes to Production
From OCR to AI The Future of Media and Image Analysis in eDiscovery
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
Understanding Discovery in Commercial Litigation
Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
Key Discovery Points: Be Willing to Agree and Compromise When It Comes to Hyperlinks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Key Discovery Points: Don’t Rush in as an AI Fool!
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Brooklyn District Attorney Eric Gonzalez – Innovative Approach to Safety
Key Discovery Points: Timing is Mostly Everything in eDiscovery
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more
Litigants in data breach class actions often fight over whether a data breach investigation report prepared in response to the breach is protected by the work-product doctrine. Common areas of dispute include whether the...more
Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more
Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more
The court granted the third-party defendant’s first motion to dismiss for lack of general jurisdiction but permitted the parties to conduct jurisdictional discovery. After the close of jurisdictional discovery, the...more
This week’s post covers the period of December 15-20. Here’s what’s happening....more
For years, the EDRM has been seen as a stepwise, left-to-right process involving endless data movement and multiple tools. But what if you could revolutionize that approach? In this eye-opening session, discover how...more
Join us for a presentation and networking session to celebrate eDiscovery day. In keeping with managing complexity through eDiscovery, come and join ACEDS to hear about changes to the Australian Privacy landscape and what...more
Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more
One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more
Last week’s Privilege Point described a data breach victim’s latest losing effort to claim privilege protection for its consultant’s investigation report. Leonard v. McMenamins Inc., Case No. C22-0094-KKE, 2023 U.S. Dist....more
In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more
With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
This story has been covered across cybersecurity media, but it’s so big I’m surprised it hasn’t been covered even more, by mainstream media. A ransomware attack by the Conti ransomware group has left the Costa Rican...more
Data privacy issues continue to be a major topic in e-discovery and litigation, but it can be hard to know exactly what is required by law when it comes to protecting client information. This article discusses how the...more
With Memorial Day weekend behind us, many people are celebrating the unofficial start of summer. And summer is almost always a blessing—nicer weather, beach vacations, shorter Fridays (if you’re lucky)—you’ve got to think...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more
Last week, Judge Linda Lopez of the U.S. District Court for the Southern District of California dismissed the class action lawsuit against Netgain Technology due to the lack of personal jurisdiction over the business. The...more
This webinar is intended for eDiscovery professionals interested in the overlap between data privacy and eDiscovery capabilities, workflows and use cases. The tools to tackle the protection of personal data already exist...more
Editor’s Note: On December 1, 2021, HaystackID shared an educational webcast designed to present and describe a framework for deploying and enhancing organizational information governance programs....more
A recent decision from a federal court in Pennsylvania highlights the importance of a carefully crafted statement of work (“SOW”) when commissioning an investigative report in response to a data security breach. A convenience...more
Editor’s Note: As part of the interview series called Wisdom From The Women Leading The Cybersecurity Industry, author, interviewer, and CEO of Data443 Risk Mitigation, Inc., Jason Remillard, recently shared the following...more
In today’s world of dramatically increased remote work due to the pandemic, growing data privacy concerns with GDPR, CCPA and other data privacy legislation, increase in harassment claims with #metoo and rising corporate...more
Editor’s Note: On May 19, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations can better manage the volume of DSAR, PII, Discovery, and...more