Judge Xavier Rodriguez on Possession, Custody, or Control from the Meet and Confer Podcast
Key Discovery Points: ESI Protocol Objection Denial Party
Key Discovery Points: Be a Team Player When It Comes to Production
From OCR to AI The Future of Media and Image Analysis in eDiscovery
All Things Investigation: Due Diligence and Drama: A Deep Dive into Art World with Daniel Weiner
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
Understanding Discovery in Commercial Litigation
Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
Key Discovery Points: Be Willing to Agree and Compromise When It Comes to Hyperlinks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Key Discovery Points: Don’t Rush in as an AI Fool!
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Brooklyn District Attorney Eric Gonzalez – Innovative Approach to Safety
Key Discovery Points: Timing is Mostly Everything in eDiscovery
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
What are Some of the Concerns With Applying AI to Document Review?
In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more
On January 7th, 2025, Meta announced they will be making major changes to content moderation policies on all their owned platforms, including Facebook: ending third-party fact-checking in the US in lieu of a new "Community...more
While record retrieval may sound like a straightforward task, legal professionals know it’s a complex, time-consuming process involving multiple entities, layers of rules and regulations, and security concerns (which...more
Join Greg Sullivan and Matt Maslow from Deloitte, as they showcase how they have harnessed Generative AI to overcome some of the most persistent challenges in eDiscovery review. Drawing from their experience building a custom...more
Reflection and anticipation—these words are especially resonant at this time of year. While we look back at the accomplishments and progress made in the last year, it’s important to prepare for the year ahead by identifying...more
Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more
Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more
As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more
Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more
9/25/2019: more on searching text files with powershell - Case sensitive search for multiple strings: Select-String -Path C:\FooFolder\txt\*.txt -pattern Art,Beauty,Law -CaseSensitive - 9/26/2019: more helpful...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more
Sorry folks. Litigation Support Tip of the Night is badly sleep deprived. These tips will improve when he is no longer working on a trial....more