Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
A Blueprint for Efficient SRRs: Mastering Your Subject Rights Workflow
Podcast - Talking Sickle Cell Trait with NFL Wide Receiver Ty Montgomery and Dr. Anjulika Chawla, MD, FAAP
Meritas Capability Webinar - Legal Cannabis and the Health Care Industry
[WEBINAR] Planning in the Coastal Zone
A Marketing Platform That Matches the Type of Firm - Faegre Baker Daniels + ON24
Webinar: How to Get Your Lawyers Sharing Successfully on LinkedIn - with @AdrianDayton
Expect fireworks with this month’s eDiscovery case law disputes! In our July 2025 monthly webinar of cases covered by the eDiscovery Today blog we will discuss disputes related to improper boilerplate objections,...more
Time to “spring” – into more eDiscovery case law! Our March 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses disputes over in camera review of privilege logs, waiver of privilege over failing to...more
We all know that there are Federal and State rules that govern how eDiscovery is conducted, but legal professionals need examples to illustrate how the rules should be applied, and what NOT to do. This webinar will use actual...more
Our May monthly webinar of cases covered by the eDiscovery Today blog discusses disputes including third-party subpoena jurisdictional disputes, disputes over forensic imaging, the use of file “shredder” software and...more
eDiscovery Case Law disputes can be “taxing” for the courts, but they’re fun to discuss! Our April monthly webinar of cases covered by the eDiscovery Today blog discusses disputes including third-party subpoena jurisdictional...more
In this breakthrough product demonstration, you’ll see how H5 Matter Analytics combines its powerful solutions for privilege identification with a new Privilege Log design module to simplify and expedite the privilege logging...more
Identifying and logging potentially privileged documents has long been a pain point in document review. Expensive and time-consuming, ad hoc privilege workflows are the norm in most situations. That all changes with a new...more