Judge Xavier Rodriguez on Possession, Custody, or Control from the Meet and Confer Podcast
Key Discovery Points: ESI Protocol Objection Denial Party
Law School Toolbox Podcast Episode 514: Listen and Learn -- Discovery (Civ Pro)
Key Discovery Points: Be a Team Player When It Comes to Production
From OCR to AI The Future of Media and Image Analysis in eDiscovery
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
Understanding Discovery in Commercial Litigation
Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
Key Discovery Points: Be Willing to Agree and Compromise When It Comes to Hyperlinks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Key Discovery Points: Don’t Rush in as an AI Fool!
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Brooklyn District Attorney Eric Gonzalez – Innovative Approach to Safety
Key Discovery Points: Timing is Mostly Everything in eDiscovery
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
Truck crash scenes reveal only part of the full story through their debris. Hidden deep within the cab of that 18-wheeler may be a crucial piece of evidence: The electronic control module (ECM), which serves as the truck’s...more
In one of the most closely watched issues before the Georgia Legislature this year, Georgia law has been amended through two tort reform bills, Senate Bills 68 and 69. These bills will impact various aspects of Georgia’s...more
In today’s digital age, text messages play a significant role in communication. Whether through SMS, WhatsApp, or other messaging platforms, people send millions of messages daily, often discussing everything from social...more
Liability insurers often receive policy limit demands from third-party claimants that allege serious injuries without corroborating medical records or bills. Since the enactment of California Civil Procedure Code section 999...more
Recent case law confirms that trade secret owners should proactively investigate any suspicions of theft, and if they do not, they may be at greater risk of being barred under the statute of limitations than they may expect....more
Filing a personal injury claim can be challenging, especially in a state full of unusual laws like California. Each year thousands of Californians seek compensation for injuries and accidents. California has specific laws,...more
Section 130 of the Building Safety Act 2022 (BSA) allows the High Court to make building liability orders (BLO) if it considers it just and equitable to do so. Section 132 allows the court to make an information order to...more
Brown v. Brooks, 2024 WL 5008506, No. 23-2966 (E.D. Pa. Dec. 6, 2024) - This matter involved a motor vehicle accident between the plaintiff and a laundry truck driver, and it illustrates the danger of errors during discovery....more
1) Preservation Demand. Send an evidence preservation notice to anyone you think may be liable or contributed to the fire (so the entity is on notice not to destroy, delete, or alter relevant evidence)....more
Here is a case from the opposite coast of the United States. This case may be looked at as persuasive authority in cases filed in the 9th circuit...more
Wise or not, parties have a right to waive discovery from the other party and settle their matter. Sometimes, both parties have access to and/or knowledge of all of the finances. Sometimes, the rely on the parties sworn Case...more
The concept of corporate legal separateness has long been a fortress protecting affiliated business entities such as parents, subsidiaries, and sister companies from various kinds of liability and litigation. However, how...more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more