Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
In this Key Discovery Points video, Brett Burney of Nextpoint and Doug Austin of eDiscovery Today discuss key takeaways from Tremblay v. OpenAI, where the court denied plaintiffs’ proposed search terms for a third time. They...more
The construction industry faces unique challenges in eDiscovery, from managing vast data volumes to protecting sensitive communications and plans. HaystackID®’s upcoming webcast will explore practical and advanced artificial...more
Get ready for some epic showdowns as Chicago ACEDS and Cimplifi present The Great eDiscovery Debate on July 16th!...more
In modern litigation, more and more cases involve massive volumes of electronic data at the discovery phase, leaving legal teams to wade through a sea of documents to uncover relevant evidence. All this noise in the data can...more
The ESI protocol is a negotiated document that expressly states how the parties to a litigation should produce electronically stored information (ESI). The ESI protocol assures against surprises and commands that ESI is...more
A detailed ESI protocol will simplify ediscovery and lead to smoother case planning in every step of the litigation process. Establishing an ESI protocol might seem daunting at first, but answering a few simple questions at...more
Looking beyond the keyword list paradigm as AI and analytics take the stage - In a 2012 True North blog post, one of our H5 experts provided some practical advice on reducing privilege review burdens and costs by...more
Privilege logs are often considered back-burner items in complex litigation and not addressed until discovery deadlines draw near. However, paying attention to privilege logs early on can be a hidden factor in in a successful...more