Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
NFTs 101: The Basics of Non-Fungible Tokens, and Beyond
Sitting with the C-Suite: How eDiscovery is Colliding with Current Events
Sitting with the C-Suite: Empowering ESI Technology Investment with Metadata Analysis
Abstract - This article addresses a critical source of confusion in legal technology: the conflation of document content and metadata in generative AI tools for eDiscovery. Document content is the text and visual data you see...more
A privilege log is a critical component of the discovery process,. It provides a line-by-line account of confidential communications, documents, and other materials that have been withheld or partially redacted due to claims...more
In In Re: Uber Technologies, Inc. Passenger Sexual Assault Litigation, 2025 WL 678543 (Mar. 3, 2025), the court issued another hyperlinked document discovery decision arising out of the parties’ ESI Protocol. While...more
Effective management of discovery disputes is critical in litigation, particularly as courts enforce stricter adherence to discovery deadlines. A recent decision in Valeo Schalter und Sensoren GmbH v. NVIDIA Corp. highlights...more
Conducting ediscovery in Outlook may be tempting – but although it’s a free and familiar tool, it carries risks and limitations for document review. Email continues to be the primary source of electronic evidence in...more
Ediscovery document productions are often sent as a single, clunky PDF. Here’s why you should avoid sending – or receiving – this “document dump.” Document productions in ediscovery shouldn’t be difficult – opposing...more
Read these ediscovery collection best practices to learn why self-collection – or allowing clients to collect their own data – is dangerous. Picture this: it’s 1988 and you’re at your desk, poring over a veritable...more