Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Podcast - Talking Sickle Cell Trait with NFL Wide Receiver Ty Montgomery and Dr. Anjulika Chawla, MD, FAAP
Meritas Capability Webinar - Legal Cannabis and the Health Care Industry
[WEBINAR] Planning in the Coastal Zone
A Marketing Platform That Matches the Type of Firm - Faegre Baker Daniels + ON24
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
How do you direct your clients when it comes to collecting their potentially relevant data from computers, file shares, and mobile devices? It’s critical to provide clear and accurate instructions. You can’t leave it up to...more
Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more
When employees depart – voluntarily or involuntarily – they often leave behind a digital footprint that may be critical to investigations, litigation, or regulatory compliance. Ensuring their data is properly identified,...more
Discover essential strategies and tips for effective data collection across diverse digital landscapes, including mobile devices, social media, and collaboration platforms. This webcast will delve into how legal teams can...more
The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more
After collecting, analyzing the volume of data found on devices can be overwhelming. Attorneys and eDiscovery practitioners need the ability to gather insights across a variety of data sources, especially third-party...more
In this webinar, presented by TransPerfect Legal Solutions in conjunction with ACEDS, lean from leading forensics experts on best practices and pitfalls to defensibly acquire data from mobile device applications and...more