Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Key Discovery Points: Timing is Mostly Everything in eDiscovery
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
How Attorneys’ Views on AI Are Impacting eDiscovery
Key Discovery Points: Get Your Objections In Early – and Keep Your Filings Succinct
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
Firma digital y firma electrónica, parecidas … pero diferentes
eDiscovery Needs Digital Forensics for a Mobile World
Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
You may have asked a team member or associate to jot down notes during a Zoom call, only to find that they struggled to capture every key point while also actively participating in the discussion. Or perhaps you aimed to...more
Big data can mean big problems in the ediscovery and compliance world – and those problems can be exponentially more complicated when personal data is involved. Sifting through terabytes of data to ensure that all personal...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more
Companies have always taken the position that an employee’s use of company e-mail is not private, and can be accessed and reviewed by the company at any time. There have been a large number of court cases, which have held...more
The Background: Technology has transformed the way that directors receive and review information and communicate with each other and with management. The Issue: Although many modern board practices are more secure and...more