Insurance Companies and the Attorney-Client Privilege in Arizona
Expect fireworks with this month’s eDiscovery case law disputes! In our July 2025 monthly webinar of cases covered by the eDiscovery Today blog we will discuss disputes related to improper boilerplate objections,...more
In this week’s Case of the Week, I dive into a critical decision from FTC v. Amazon.com, Inc. (August 1, 2024), which underscores the precarious nature of privilege in document production—particularly in the context of...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of March 11-17. Here’s what’s...more
Privilege logs have been getting a lot of attention, with good reason. “Privilege logging is arguably the most burdensome and time consuming task a litigant faces during the document production process.” The Sedona...more
Time to “spring” – into more eDiscovery case law! Our March 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses disputes over in camera review of privilege logs, waiver of privilege over failing to...more
We all know that there are Federal and State rules that govern how eDiscovery is conducted, but legal professionals need examples to illustrate how the rules should be applied, and what NOT to do. This webinar will use actual...more
Our May monthly webinar of cases covered by the eDiscovery Today blog discusses disputes including third-party subpoena jurisdictional disputes, disputes over forensic imaging, the use of file “shredder” software and...more
eDiscovery Case Law disputes can be “taxing” for the courts, but they’re fun to discuss! Our April monthly webinar of cases covered by the eDiscovery Today blog discusses disputes including third-party subpoena jurisdictional...more
In this breakthrough product demonstration, you’ll see how H5 Matter Analytics combines its powerful solutions for privilege identification with a new Privilege Log design module to simplify and expedite the privilege logging...more
Identifying and logging potentially privileged documents has long been a pain point in document review. Expensive and time-consuming, ad hoc privilege workflows are the norm in most situations. That all changes with a new...more