Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Podcast - Talking Sickle Cell Trait with NFL Wide Receiver Ty Montgomery and Dr. Anjulika Chawla, MD, FAAP
Meritas Capability Webinar - Legal Cannabis and the Health Care Industry
[WEBINAR] Planning in the Coastal Zone
A Marketing Platform That Matches the Type of Firm - Faegre Baker Daniels + ON24
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
White-collar crimes present investigators with intricate challenges that require precision, expertise, and advanced technology. In today’s high-profile investigations, the stakes couldn’t be higher, with reputations,...more
Join us for the summer edition of Mitratech’s Corporate Legal Corner, a virtual event series and tech expo where legal professionals are invited to attend an expert-led panel discussion followed by solution-focused breakout...more
Participants will leave the presentation with an understanding of the impact of technology on the legal industry, the strategic management of technology in legal operations, and the skills necessary to navigate and lead in an...more
Join our first rendition of Mitratech’s Corporate Legal Corner, a virtual event series where legal professionals are invited to engage in an expert-led panel discussion and solution-focused breakout rooms. This is your...more
Join the managers leading TAR and analytics teams at Hogan Lovells, Orrick and Paul Weiss for a discussion on practical applications of machine learning technologies for eDiscovery and investigations. They'll explain why...more
Today’s eDiscovery and investigation challenges—from severe resource pressures to an increasingly remote workforce and remote devices, new ESI types and new sources of litigation on the horizon—require a modern approach. ...more
The smoking gun isn’t a gun anymore; it’s an email, text or instant message. This interactive session will focus on strategies and best practices around email investigations illustrated with real documents obtained through...more
Identifying and logging potentially privileged documents has long been a pain point in document review. Expensive and time-consuming, ad hoc privilege workflows are the norm in most situations. That all changes with a new...more