eDiscovery and Compliance Programs
Key Discovery Points: A Gentle Distinction for Agentic AI
Key Discovery Points: Exciting eDiscovery Sessions at ILTACON 2025!
Key Discovery Points: ESI Protocol Objection Denial Party
Key Discovery Points: Be a Team Player When It Comes to Production
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Key Discovery Points: Timing is Mostly Everything in eDiscovery
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
How Attorneys’ Views on AI Are Impacting eDiscovery
Key Discovery Points: Get Your Objections In Early – and Keep Your Filings Succinct
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of April 20-26. Here’s what’s...more
In Lively v. Wayfarer Studios LLC, 2025 WL 662896 (S.D.N.Y. Feb. 28, 2025), the court granted in part and denied in part a motion to quash subpoenas issued to AT&T, Verizon, and T-Mobile (the “Wayfarer Parties”) by Ms. Blake...more
Maybe some of you will look at the title of this article, smirk, and dismissively mutter that there is nothing new about text messages. eDiscovery practitioners also may think there is nothing revolutionary about considering...more
GDPR. It’s all over the news. G** D@m% PR. Nearly everyone’s flustered by it. And, if you’re not already sick of hearing about it, your company’s probably still scrambling to duct-tape together a last minute patch to comply...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more