Slack has transformed the way modern organizations communicate. Conversations that once happened over long email threads now take place in fast-moving channels, private messages, and quick back-and-forth threads. While this...more
In this CLE webinar, participants are introduced to the workflows and technologies commonly encountered during electronic discovery. Designed to provide a solid foundation in the Electronic Discovery Reference Model (EDRM),...more
With the digital realm increasingly shaping both our personal and professional lives, the rise of electronic evidence in legal cases was inevitable. But as technology advances, so do the methods for creating fake digital...more
ComplexDiscovery’s Editor’s Note: Generative AI is reshaping industries, and the legal community is facing pressing challenges, particularly concerning the authenticity of digital evidence. As AI technology continues to...more
As recently highlighted by this blog, on September 12, 2024, the Justices of the Commercial Division gathered in the offices of Kelley & Drye to discuss new updates and happenings in the world of the Commercial Division...more
This is the conclusion to a two part article. Please read Part One first. There must be legal recourse to stop this kind of fraud and so protect our basic freedoms. People must have good cause to believe in our judicial...more
On April 19, 2024, the Advisory Committee on Evidence Rules for federal courts faced a critical question: Does AI-generated evidence, including deepfakes, demand new rules? The Committee’s surprising answer—’not yet.’ Was...more
What can we do to address the challenge of Deepfakes being presented as relevant and authentic evidence in the justice system? Deepfake technology poses a serious challenge to establishing and rebutting the authenticity of...more
In the summer of 2023, the European Union ("EU") adopted two legal acts that are intended to improve cross-border access to electronic evidence for judicial authorities in criminal proceedings. This refers to digital data...more
Hey there, fellow legal tech enthusiasts! It’s Cat Casey, back with another installment to help you navigate the legal tech maze. Today, we’re diving deep into the world of ESI Protocols. If you’re thinking, “ESI-what-now?”,...more
Conducting ediscovery in Outlook may be tempting – but although it’s a free and familiar tool, it carries risks and limitations for document review. Email continues to be the primary source of electronic evidence in...more
On August 29, 2022, the Maryland Court of Appeals issued its opinion in Richardson v. Maryland, expanding the protection of the Fourth Amendment for subjects of criminal investigations whose cell phones are subject to a...more
Ankura's Data & Technology Leader for APAC, Chris Marks and Data & Technology Leader for Greater China, Han Lai, in Hong Kong & Shanghai respectively, sit down with Kaylee & Mary to talk about how they found their feet on...more
Editor’s Note: On September 16, 2020, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on the complexities of eDiscovery support in pharmaceutical industry matters...more
One of the most important differences between the Florida and Federal judicial systems is the treatment of summary judgment motions. The distinction arises from differing judicial attitudes rather than the wording of the...more
Widely-available digital tools have made it easier than ever for individuals to fabricate and alter digital evidence. Forensic experts and skilled trial attorneys will discuss how to spot suspicious electronic evidence;...more
Companies are searching alternative ways to have a wide range of documents (internal and external) signed safely under the new safe-distance rules and while dispersed. Join Locke Lord for a complimentary 60-minute webinar...more
Litigators and corporate clients must stay up to date with new technologies and be aware the legal implications that are implicit with new technologies. Lawyers also have an ethical obligation to understand the benefits and...more
Determining whether programs or malware actually ran on a system is an important goal of seasoned examiners when investigating computer evidence. Generally, there are several artifacts left behind anytime executables are...more
Many competent IT departments lack the expertise, hardware, or software to preserve evidence in a forensically sound manner and to thoroughly investigate a security incident. In-house counsel needs to be able to recognize...more
The employment law landscape continues to be dominated by Workplace Law class actions. Jackson Lewis attorneys are defending hundreds of class and collective actions all over the country. Tapping into that experience, this...more
Last month, we wrote about the Seventh Circuit’s decision in Rowe v. Gibson, No. 14-3316 (Aug. 19, 2015), a decision written by Judge Richard Posner that created considerable controversy regarding the propriety of internet...more
The FBI’s latest weapon in locating electronic evidence is not a computer program, it’s a dog. The FBI is using data-sniffing dogs in raids to cut down on the time it takes agents to locate small hidden data storage devices....more
Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more
A 2013 ruling from the Rhode Island Superior Court illustrates the necessity of preserving potentially relevant information in the face of pending or threatened litigation, and the harsh consequences that can result from a...more