Latest Publications

Share:

The Vendor Governance Wake-Up Call

The “Panama Papers” leak and other breaches at major law firms in the past year bear out the findings from the American Bar Association’s 2015 Legal Technology Survey Report. Earlier this month, 11.5 million documents were...more

Close Encounters of the eDiscovery Kind

Last week, two astronomers at CalTech predicted that a new planet is lurking at the edges of the solar system. They discovered the planet using computer simulations and mathematical calculations based on the planet’s...more

Success in Discovery Requires More Than the Best-Laid Plans of Mice and Men

According to popular legend, in 1786, Scottish poet Robert Burns wrote that the “best-laid plans of mice and men often go awry” as part of his apology to a mouse whose nest he destroyed while ploughing a field. These words...more

Don’t Let Your Lack of Audio Discovery Speak Volumes

Even for organizations not subject to laws that require them to keep certain oral communications, such as the Dodd-Frank Wall Street Reform and Consumer Protection Act, audio recordings are becoming more prevalent in requests...more

Controlling the $7 Billion Patent Troll Litigation Machine

Nearly $7 billion: that is the projected cost of litigation filed by non-practicing entities, or patent trolls, in 2015. A recent report by Unified Patents revealed that patent case filings are expected to surpass 6,100 this...more

Don’t TAR and Feather Technology in E-Discovery

In the three years since the watershed decision in Da Silva Moore v. Publicis Groupe, technology-assisted review (TAR) has transformed from being a merely “acceptable way to search for relevant” ESI into “black letter law...more

Is Your ITAR Controlled Data AWOL?

Do you know whether your business is covered by the International Traffic in Arms Regulations (ITAR)? Even if your organization does not export military products and services, ITAR’s coverage extends to entities that handle...more

A Case Study: Technology-Assisted Review Versus Search Terms

In a recent multibillion-dollar fraud case, a global financial services company had three months to identify, collect, process, review, and produce responsive documents from a collection of 30 million documents. Given the...more

Haggle in Discovery at Your Own Risk

Attention has recently been paid to the duty of competence outlined in comment 8 to ABA Model Rule of Professional Conduct 1.1, which requires lawyers to understand the “benefits and risks associated with relevant...more

Technology-Assisted Review Is Not an “Unproven Technology”

During discovery in Dynamo Holdings Limited Partnership, Petitioner v. Commissioner of Internal Revenue, the IRS filed a motion to compel two taxpayers to produce two backup storage tapes, copies of the tapes, or their...more

How To Integrate E-Discovery Into Business Processes In Five Steps

With little notice, compliance officers, in-house counsel, and other legal professionals for organizations in the oil and gas industry may be required to hand over sensitive files in response to compliance, regulatory, or...more

A More Progressive Case for the Use of Technology-Assisted Review

As we mentioned in a recent blog post, a federal magistrate judge in the District of Nevada recently refused to allow a party to use technology-assisted review (TAR) on top of its use of search terms to screen documents...more

The Long Arm of E-Discovery Stretches Overseas

Earlier this year, Kazuaki Fujitani, the general manager of a Japanese company’s sales division, pled guilty to obstruction of justice for destroying numerous e-mails and other documents in a federal investigation by the...more

Quality Control Is Job 1

In January, U.S. Magistrate Judge Paul S. Grewal sanctioned Samsung and its law firm for a series of violations involving the disclosure of a document containing confidential information in contravention of the court’s...more

Cybersecurity Is Not Just an IT Issue; It’s an IG Issue

For leaders and counsel in many organizations, the word “cybersecurity” typically triggers concerns about the IT department, conjuring images of hackers and requiring unfamiliar terminology such as “firewalls” and...more

15 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.