BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Ralph Ferrara Discusses Private Securities Litigation at PLI
Jason Maloni on Data Security
Safeguards against Data Security Breaches (Part Two)
LPOs Stealing Deal Work from Law Firms
Three Key Data Retention Questions
Top 3 Concerns in Data Security
Social Media as Evidence: Challenges & Considerations
Cybersecurity and Data Privacy: Big Data and the Law
Manage your electronic data before facing litigation. Melissa Darigan, Litigation Attorney
5 Things to Consider When You Are Served with a Lawsuit
Just like in the Beatles song, the long and winding road leading to Federal Rules of Civil Procedure (FRCP) amendments took another turn on April 10th and 11th when the Advisory Committee considered the proposed rules package...more
In any document search allowing defendants’ custodians to conduct their own searches is much like allowing the fox to guard the henhouse. Even focused and disciplined custodial collections can be fraught with problems....more
As electronic discovery issues permeate all kinds and sizes of litigation and arbitration, there are a minimum of four questions counsel should, and judicial officers might, consider in determining whether use of an...more
In cases involving large amounts of electronically stored information (ESI), those of us at mid-sized or smaller firms may sometimes feel a little out-gunned when the requests for production and documents start flying. While...more
How do you stop a security professional’s heart from beating?
Two words: security breach. In today’s “Internet of Everything” environment, the impact of a security breach can be felt around the world and back again…in...more
While it is true that social media has become one of the main sources for discovery in personal injury litigation, the basic tenants of discovery that apply to the standard document requests, also apply to this new...more
In This Issue:
- Employer Access to Employee Social Media: Applicant Screening, ‘Friend’ Requests and Workplace Investigations
- Driving Under the Influence (of Google Glass)
- U.S. Courts’ Evolving Approaches to...more
Unlike the classic British sitcom "Are You Being Served?", as any business owner who has been on the receiving end of a threat of litigation or was served with a complaint can attest, there is nothing remotely amusing about...more
Venturing down memory lane to when I was a first year law student with a thirst for knowledge, I’m reminded of the proverbial “Aha!” moment that struck me when all the information I’d been learning about distinct areas of law...more
SB 4 did not place a moratorium on the use of hydraulic fracturing or other well stimulation treatments. SB 4 specifically states that so long as an operator complies with the notification and documentation requirements...more
With today’s prevalence of electronic documents, e-discovery is easily the largest single line item in any company’s litigation budget. It can often consume more than half the allotted funds and even exceed the actual dollar...more
E-Mails Continue to Be the Modern "Smoking Gun" -
The recent financial-collapse and bankruptcy of former mega-law firm Dewey & LeBoeuf has captivated the attention of the legal industry, but are there lessons to be...more
Facebook. Instagram. YouTube. Twitter. LinkedIn. SnapChat. Flickr. Google+. Tumblr. WeChat. MySpace. WhatsApp. Reddit. The list of social media and networking sites goes on and on. It’s fairly common knowledge...more
The United States District Court for the Southern District of Texas declined to impose litigation ending discovery sanctions for several claims of spoliation, but does plan to issue a spoliation instruction in Quantlab...more
Courts across the United States have now made clear that discovery of social media is fair game. At the same time, courts have consistently found that litigants will not be permitted to engage in social media fishing...more
Sokn v. Fieldcrest Cmty. School Dist. No. 8, 2014 WL 201534 (C.D. Ill. Jan. 17, 2014).
In this discrimination lawsuit, the plaintiff was the only female principal in the defendants’ school district. The plaintiff...more
Gardner v. Cafepress, Inc., 2014 WL 794216 (S.D. Cal. Feb. 26, 2014).
In this copyright case, the plaintiff alleged that the defendant infringed on the plaintiff’s copyrights to an image and sought the seizure and/or...more
McPherson v. Canon Bus. Solutions, Inc., 2014 WL 654573 (D.N.J. Feb. 20, 2014).
In this putative class action case, the plaintiff alleged violations of the Fair Credit Reporting Act in the defendant’s hiring practices....more
T & E Inv. v. Faulkner, 2014 WL 550596 (N.D. Tex. Feb. 12, 2014).
In this case, the plaintiffs sought sanctions for the defendant allegedly manipulating metadata to try to conceal the use of an unproduced computer. The...more
Once thought of as an anonymous method of buying and selling goods and services, Bitcoin users and researchers are increasingly aware of the inherent limits of anonymity in the context of Bitcoin use. Similar to any other...more
This article reviews the history of discovery in Minnesota practice under the Minnesota Rules of Civil Procedure, analyzes the place of electronic discovery in Minnesota today, and attempts to predict how the courts may deal...more
Fed. Hous. Fin. Agency v. HSBC, 2014 WL 584300 (S.D.N.Y. Feb. 14, 2014).
In this housing case, the plaintiff, which regulates Fannie Mae and Freddie Mac, sued 18 banks, over misrepresenting the quality of mortgage...more
Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more
In many criminal cases, cellular telephone records are an invaluable resource. These records may shed light on whether an alleged victim or witness communicated with someone of importance in a case, and when. There are...more
Last month, Edward Snowden provided the press a document describing “how Australian intelligence conducted surveillance of trade talks between Indonesia and the United States and, in the process, monitored communications...more
Find an Electronic Discovery Author »
Back to Top