Wearable Technology: A Perfect Fit For Litigation
Special Report: The Hot-ish Swag at LegalTech New York 2015
Proposed FRCP Changes: Effect on eDiscovery, RIM & IG (CLE)
IP | Trend: Data in the Cloud is the Next Big Storm?
Data Privacy: The Next Frontier of Corporate Compliance
Two Tips for Inventors Filing Patent Applications
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Ralph Ferrara Discusses Private Securities Litigation at PLI
Safeguards against Data Security Breaches (Part Two)
LPOs Stealing Deal Work from Law Firms
Three Key Data Retention Questions
Top 3 Concerns in Data Security
Social Media as Evidence: Challenges & Considerations
Cybersecurity and Data Privacy: Big Data and the Law
Manage your electronic data before facing litigation. Melissa Darigan, Litigation Attorney
5 Things to Consider When You Are Served with a Lawsuit
The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more
As we discussed in our previous post, Premera Blue Cross (Premera) recently revealed that it suffered a massive data breach potentially exposing the personal data of 11 million customers. ...more
On March 23, the Federal Reserve and the Office of the Comptroller of the Currency – both non-parties in the suit – filed briefs requesting that a district court reject a motion to compel discovery of over 30,000 documents...more
5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more
“There are only two types of companies left in the United States … those that have been hacked and those that don’t know they’ve been hacked.” That is how U.S. District Judge John E. Jones III of the Middle District of...more
The Federal Communications Commission’s (“FCC”) net neutrality proceeding culminated this month with the release of an Order reclassifying broadband Internet access service as a common carrier Telecommunications Service...more
So your client has been involved in motor vehicle collision. Now what? Whether representing a plaintiff or a defendant in a crash, preserving all potentially relevant evidence is an obvious first concern. What may not be so...more
The Alberta Court of Queen’s Bench recently released its decision in TransAlta Corporation v. Market Surveillance Administrator (TransAlta v. MSA), ordering TransAlta Corporation (TransAlta) to produce hundreds of documents...more
One of this year’s themes at the South by Southwest (SxSW) festival is “Surviving the Shift: Rethinking Music and Data.” The music industry is transforming itself as the trend in buying music shifts from digital download to...more
Rio Tinto PLC v. Vale S.A., 2015 WL 872294 (S.D.N.Y. Mar. 2, 2015).
In this fraud case, the parties stipulated that they would use predictive coding during the discovery process. Judge Peck issued this opinion due to...more
Bagwe v. Sedgwick Claims Mgmt. Servs., Inc., 2015 WL 351244 (N.D. Ill. Jan. 27, 2015).
In this employment discrimination case, the court granted the defendants’ motion for summary judgment. The defendants then filed...more
Hillary Clinton is currently under fire for the use of a personal email account while United States Secretary of State. Mrs. Clinton apparently exclusively (or nearly exclusively) used her personal email account while...more
United Corporation v. Tutu Park Ltd., Inc., 2015 WL 457853 (V.I. Super. Jan. 28, 2015).
In this breach of contract case, the plaintiff asked the court to impose sanctions on Kmart, a non-party to the suit, and to hold...more
Data security breaches have become unfortunately prevalent amongst higher education institutions. In fact, colleges and universities suffer data breaches at a rate of just over one per week.(1) The Privacy Rights...more
Unlike the absolute attorney-client privilege, the work product doctrine offers two possible levels of protection. Lawyers' (and other client representatives') opinions deserve absolute or nearly absolute protection in most...more
Comprehensive Addiction Treatment Ctr. v. Leslea, 2015 WL 638198 (D. Co. Feb. 13, 2015).
In this private civil rights enforcement case, the court dismissed the case, ruling that the defendants had qualified immunity. The...more
On March 11, 2015 the Italian Data Protection Authority (Garante per la protezione dei dati personali, the “Italian DPA“) initiated a public consultation on the draft Code of Conduct concerning the processing of personal data...more
A federal district court in New York has held that the attorney-client and work-product privileges apply to coverage memoranda sought by an insured from AIG Specialty Insurance in an ongoing coverage and bad faith litigation...more
Parsi v. Daioleslam, 2015 WL 525146 (D.C. Cir. Feb. 10, 2015).
In this appeal from a defamation case, the plaintiff sought the reversal of sanctions imposed by the district court. At trial, the plaintiff sought damages...more
You want to protect the identity of your business’ owners, but your opponent issued discovery requesting a copy of your organizational chart and/or information on the identities of your LLC members or LP partners. You are...more
In his March 2, 2015 order issued in Rio Tinto PLC v. Vale S.A., et al., No. 14-Civ-3042 (S.D.N.Y.), Magistrate Judge Andrew Peck brought the world of predictive coding back to the future. ...more
Litigation, particularly complex litigation, can be just that, complex. The complexity of litigation necessarily requires the ability to manage multiple moving parts in all phases of a case in the most efficient and...more
A significant difference between the French and U.S. and UK legal systems is in the understanding of legal privilege: it does not exist for in-house counsel in France....more
Magistrate Judge Andrew J. Peck’s recent decision in Rio Tinto PLC v. Vale S.A., S.D.N.Y., No. 14 Civ. 3042 (RMB)(AJP) (March 2, 2015), recognizes disclosure of non-responsive documents is not a per se requirement in cases...more
We observed previously that “reasonably calculated” does not define scope of discovery, and it never has. Rather, discovery is limited, by the plain terms of F. R. Civ. P. 26, to “nonprivileged matter that is relevant to any...more
Find an Electronic Discovery Author »
Back to Top