Just Press "Play"
Key Discovery Points: Be a Team Player When It Comes to Production
Podcast - “I Lied Like a Dog!”
Law School Toolbox Podcast Episode 511: Listen and Learn -- Landlord/Tenant Law (Part 1)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Podcast - How Do You Define Success?
The Three C’s for Addressing Prior Inconsistent Statements
Understanding Discovery in Commercial Litigation
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
Podcast - "Ready for Trial?"
Podcast - Every Case Is a New World
Law School Toolbox Podcast Episode 501: Listen and Learn -- Present and Future Estates (Part 1)
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Eyes on the Evidence: Powerful Legal Presentations – Speaking of Litigation Video Podcast
The Presumption of Innocence Podcast: Episode 57 - Wired for Truth: The Art & Science of Polygraphs
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more
Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more
When it comes to discovery of mobile devices, it’s not just the data that’s important for discovery, but also the data about the data – the metadata – that can be used to authenticate evidence, to determine whether the data...more
ComplexDisocvery’s Editor’s Note: This article underscores the growing significance of cyber diplomacy in the context of global security and international relations. As cyber threats become increasingly sophisticated and...more
In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more
Businesses are facing more uncertainty around talent and employee management than ever before. Whether it’s challenges around working from home, employee burnout, the “Great Resignation,” or the threat of recession-fueled...more
Ankura's Data & Technology Leader for APAC, Chris Marks and Data & Technology Leader for Greater China, Han Lai, in Hong Kong & Shanghai respectively, sit down with Kaylee & Mary to talk about how they found their feet on...more
So far, our discussions about the AI legal revolution have revolved around the many ways artificial intelligence is helping to combat the unstructured data crisis looming over the legal industry. However, one area we’ve yet...more
The March sessions of Legalweek took place recently, and as with the February sessions, the virtual event struck a chord that reverberated deep from within the heart of a (hopefully) receding pandemic. However, the...more
From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more
A Legal Hold, also known as litigation hold, document hold, hold order, or preservation order, has more commonly been a US term but organisations in the UK and Europe also need to ensure their data preservation practices are...more
In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more
As data continues to span across the four corners of the globe, lawmakers worldwide strive to keep up the pace with regulations. The European Union has the General Data Protection Regulation (GDPR), which provides...more
Recent laws—such as the 2016 Sapin 2 Law and the new EU General Data Protection Regulation—provide for rules that are intended to ensure compliance with the French Blocking Statute, which prohibits any French party from...more
Evidence gathering differs greatly between common law and civil law jurisdictions. For example, while a U.S. judge may in many instances allow extensive pretrial discovery, a French judge would generally consider nearly any...more
Five social media law issues to discuss with your clients - The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this...more
The sanctions recently levied against Foot Locker serve as a potent reminder that understanding data and document preservation requirements is imperative. A New York federal judge issued sanctions against Foot Locker last...more
The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more