BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Ralph Ferrara Discusses Private Securities Litigation at PLI
Jason Maloni on Data Security
Safeguards against Data Security Breaches (Part Two)
LPOs Stealing Deal Work from Law Firms
Three Key Data Retention Questions
Top 3 Concerns in Data Security
Social Media as Evidence: Challenges & Considerations
Cybersecurity and Data Privacy: Big Data and the Law
Manage your electronic data before facing litigation. Melissa Darigan, Litigation Attorney
5 Things to Consider When You Are Served with a Lawsuit
PersonalWeb Technologies, LLC ("PersonalWeb") filed a patent infringement action against Google for infringement of its "Truenames" patents. Google filed a motion for sanctions based on a contention that PersonalWeb...more
Goodwin Procter’s Business Litigation Reporter provides timely summaries of key cases and other developments within dedicated Business Litigation sessions and related courts throughout the country – courts within which...more
Cheng v. Romo, 2013 WL 6814691 (D. Mass. Dec. 20, 2013).
In this action, the plaintiff sued defendant for accessing the plaintiff’s web-based emails without authorization under the Stored Communications Act (SCA). The...more
In re Pradaxa (Dabigatran Etexilate) Products Liability Litigation, 2013 WL 6486921 (S.D. Ill. Dec. 9, 2013). In this pharmaceutical litigation, the plaintiffs’ steering committees requested sanctions stemming from the...more
Koumoulis v. Independent Financial Marketing Group, Inc., No. 10-CV-0887 (E.D.N.Y Jan. 21, 2014): A federal district court judge narrowly applied the attorney-client privilege and work-product doctrine by granting the...more
In the era of Twitter and Instagram, it should come as no surprise that a party’s cell phone data, including text messages, may prove invaluable to an adverse party during the course of litigation. As with any other...more
Cognex Corporation v. Microscan Systems, Inc., 2013 WL 6906221 (S.D.N.Y. Dec. 31, 2013).
in this patent infringement suit, the defendants moved for sanctions for spoliation of a disk that was essentially destroyed...more
The reliability and accuracy of the predictive coding process depends heavily on the identity of the documents in the seed set (including documents deemed irrelevant), because the seed set is the primary source used to teach...more
RIPL Corp. v. Google Inc., 2013 WL 6632040 (W.D. Wash. Dec. 17, 2013).
In this trademark infringement case, the defendant and plaintiff entered into a stipulated protective order which included a clawback provision...more
Calderon v. Corporacion Puertorriquena de Salud, 2014 WL 171599 (D. P. R. Jan. 16, 2014).
In this employment law case, the plaintiffs only produced a portion of the demanded text messages during discovery, claiming the...more
Spring is just around the corner (hopefully), and change is in the air! Likewise, change is in the air in ediscovery. The ediscovery process is far from perfect, but continues to evolve and change despite facing compelling...more
Businesses are increasingly leveraging technology and moving to more paperless environments. For this reason, modern business litigation almost always requires some discovery of electronically stored information (ESI). ...more
Over six thousand athletes from eighty-five countries have gathered to compete. When you sit down to watch the events, remember that behind every flag is a unique legal system, with diverse privacy laws and ediscovery...more
On February 12, Orrick submitted written comments regarding proposed amendments to the Federal Rules of Civil Procedure ("FRCP") intended to facilitate more meaningful discovery efforts and to reduce cost and delay in...more
As many recent litigants know, the costs of eDiscovery can be enormous. Therefore, the ability to recover those costs can have a significant impact on a company’s bottom line – from tens to hundreds of thousands of dollars....more
While the snow and ice could have put a serious damper on day two’s events at LTNY 2014, it soon became clear that attendees were willing to brave the elements when the first keynote of the day went ‘standing room only.’ But...more
In July 2013, the Advisory Council for the United States Court of Appeals for the Federal Circuit, a committee that includes Federal Circuit litigators, law professors, court clerks, and government attorneys, issued a “Model...more
Following a broadening trend, the U.S. District Court for the Southern District of California recently held that a party is subject to sanctions – including an adverse inference instruction at trial – for negligently failing...more
Applying U.S. Court of Appeals for the Eleventh Circuit law and addressing whether e-discovery costs are recoverable under 28 U.S.C. § 1920(4), the U.S. Court of Appeals for the Federal Circuit reversed in part, vacated in...more
Google has come under scrutiny in the last few years over collecting information from users’ email accounts to provide targeted advertising for its paid clients. ...more
In 2003, Judge Shira Scheindlin of the U.S. District Court for the Southern District of New York issued five landmark decisions, which have since shaped the landscape of electronic discovery and document preservation. ...more
CBT Flint Partners, LLC v. Return Path, Inc., 737 F.3d 1320 (Fed. Cir. 2013).
This ongoing discovery dispute stems from an order from the Court of Appeals for the Federal Circuit that reversed and remanded a district...more
Zest IP Holdings, LLC v. Implant Direct Mfg., LLC, 2013 WL 6159177 (S.D. Cal. Nov. 25, 2013).
In this patent and trademark infringement case, the plaintiffs sought sanctions for the defendants’ alleged spoliation and...more
Moore v. Citgo Co., LP, 735 F.3d 309 (5th Cir. 2013).
In this appellate Fair Labor Standards Act litigation, the class of plaintiffs sought overtime pay for work hours that had been misclassified by the defendant...more
RPM Pizza, LLC v. Argonaut Great Central Ins. Co., 2013 WL 6054551 (M.D. La. Nov. 15, 2013).
In this insurance claim case, an intervening plaintiff objected to the defendant’s production. The defendant produced ESI in...more
Find an Electronic Discovery Author »
Back to Top