Slack has transformed the way modern organizations communicate. Conversations that once happened over long email threads now take place in fast-moving channels, private messages, and quick back-and-forth threads. While this...more
In this CLE webinar, participants are introduced to the workflows and technologies commonly encountered during electronic discovery. Designed to provide a solid foundation in the Electronic Discovery Reference Model (EDRM),...more
With the digital realm increasingly shaping both our personal and professional lives, the rise of electronic evidence in legal cases was inevitable. But as technology advances, so do the methods for creating fake digital...more
ComplexDiscovery’s Editor’s Note: Generative AI is reshaping industries, and the legal community is facing pressing challenges, particularly concerning the authenticity of digital evidence. As AI technology continues to...more
This is the conclusion to a two part article. Please read Part One first. There must be legal recourse to stop this kind of fraud and so protect our basic freedoms. People must have good cause to believe in our judicial...more
On April 19, 2024, the Advisory Committee on Evidence Rules for federal courts faced a critical question: Does AI-generated evidence, including deepfakes, demand new rules? The Committee’s surprising answer—’not yet.’ Was...more
What can we do to address the challenge of Deepfakes being presented as relevant and authentic evidence in the justice system? Deepfake technology poses a serious challenge to establishing and rebutting the authenticity of...more
Hey there, fellow legal tech enthusiasts! It’s Cat Casey, back with another installment to help you navigate the legal tech maze. Today, we’re diving deep into the world of ESI Protocols. If you’re thinking, “ESI-what-now?”,...more
Ankura's Data & Technology Leader for APAC, Chris Marks and Data & Technology Leader for Greater China, Han Lai, in Hong Kong & Shanghai respectively, sit down with Kaylee & Mary to talk about how they found their feet on...more
Widely-available digital tools have made it easier than ever for individuals to fabricate and alter digital evidence. Forensic experts and skilled trial attorneys will discuss how to spot suspicious electronic evidence;...more
Many competent IT departments lack the expertise, hardware, or software to preserve evidence in a forensically sound manner and to thoroughly investigate a security incident. In-house counsel needs to be able to recognize...more
The employment law landscape continues to be dominated by Workplace Law class actions. Jackson Lewis attorneys are defending hundreds of class and collective actions all over the country. Tapping into that experience, this...more
Today’s hackers and ex-employees steal secrets with USB drives, personal email accounts, and computer networks, making computer forensics critical in detecting trade secret theft....more
A 2013 ruling from the Rhode Island Superior Court illustrates the necessity of preserving potentially relevant information in the face of pending or threatened litigation, and the harsh consequences that can result from a...more
While many cases focus on electronic evidence available on employee laptops and behind corporate firewalls, massive volumes of electronic evidence can be found on the servers of companies that provide electronic processing...more