Just Press "Play"
Key Discovery Points: Be a Team Player When It Comes to Production
Podcast - “I Lied Like a Dog!”
Law School Toolbox Podcast Episode 511: Listen and Learn -- Landlord/Tenant Law (Part 1)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Podcast - How Do You Define Success?
The Three C’s for Addressing Prior Inconsistent Statements
Understanding Discovery in Commercial Litigation
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
Podcast - "Ready for Trial?"
Podcast - Every Case Is a New World
Law School Toolbox Podcast Episode 501: Listen and Learn -- Present and Future Estates (Part 1)
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Eyes on the Evidence: Powerful Legal Presentations – Speaking of Litigation Video Podcast
The Presumption of Innocence Podcast: Episode 57 - Wired for Truth: The Art & Science of Polygraphs
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
In the first half of 2025, competition authorities across Europe have continued to vigorously use their intrusive dawn raid powers in diverse economic sectors. These operations require diligent and thorough preparation as...more
Email remains one of the most critical and challenging data sources in investigations. Whether responding to cybersecurity incidents, managing eDiscovery demands, or handling regulatory audits, organizations have to quickly...more
White-collar crimes present investigators with intricate challenges that require precision, expertise, and advanced technology. In today’s high-profile investigations, the stakes couldn’t be higher, with reputations,...more
1) Preservation Demand. Send an evidence preservation notice to anyone you think may be liable or contributed to the fire (so the entity is on notice not to destroy, delete, or alter relevant evidence)....more
The intersection of litigation, investigations, and technology is becoming increasingly vital to the success of legal teams. As organizations face mounting pressures from data proliferation, complex regulatory landscapes, and...more
In this week’s Case of the Week, I dive into a critical decision from FTC v. Amazon.com, Inc. (August 1, 2024), which underscores the precarious nature of privilege in document production—particularly in the context of...more
The digital forensics landscape in the private sector is witnessing a metamorphosis. The relentless growth and diversification of data necessitates a paradigm shift in how organizations approach investigations. Fragmented...more
The U.S. Environmental Protection Agency (EPA) is responsible for enforcing the federal laws, regulations, and Executive Orders focused on protecting the environment for the benefit of the American people, threatened and...more
The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more
Linguistics plays a crucial role in investigations under the US Foreign Corrupt Practices Act, a regulation focused on combating bribery and corruption in international business transactions. These investigations typically...more
Employee separation is an event that commonly involves investigations and litigation, as well as eDiscovery. Cases can rely heavily on electronic evidence, so Dr. Gavin W. Manes of Avansic and Craig Ball of Ball in Your Court...more
Join the EDRM in an illuminating session with some of the leading experts in the field of digital forensics and collections, Steve Davis, John Simek & Mary Mack. With a rich career spanning over three decades, Steve has not...more
With the ever-increasing rate of cybercrimes, computers are more important than ever in investigations. They hold evidence in the form of emails, internet history, documents, and other key files related to investigations. ...more
Gone are the days when legal and investigation teams had to collect online evidence screen-by-screen using multiple tools. And that’s a very good thing. Whether you’re searching through websites and social media to...more
Keyword search has been around since the inception of eDiscovery. Keywords works well in standard eDiscovery since their definitive character enable legal professionals to provide a clear scope in search, and find everything...more
Civil investigative demands (“CIDs”) are powerful tools used by state and federal agencies to gather information that will be used to investigate and prosecute individuals, corporations, physicians, and executives, etc. for...more
On July 24, 2020, the Court of Chancery in Delaware rejected defendant Centene Corporation’s broad document requests and third-party subpoenas issued as part of a stockholder action to inspect books and records, but allowed...more
Post-review litigation preparation traditionally occurs over email, with competing versions of outlines sent back and forth until no one is sure what’s the most up to date. Manual drudgery abounds, whether it’s printing out...more
As the number of people who interact on social media surpasses the one billion mark, attorneys are catching-on and turning to various platforms for investigative purposes and as informal discovery tools. We all know that the...more