Electronic Discovery Labor & Employment

Read Electronic Discovery updates, articles, and commentary from leading lawyers, law firms, and legal consultants:
News & Analysis as of

Best Practices: Keeping Corporate Communications Professional And Out Of The Courtroom

Corporate communications occur primarily electronically. It is important for companies to ensure these communications stay where they belong — within the company, not broadcast in a courtroom where a judge or jury can inject...more

BYOD = BYOA (Aspirin)

In a side-by-side comparison between the benefits and detriments of BYOD (Bring Your Own Device), there’s no doubt that allowing BYOD might seem likely to yield productivity gains and other benefits for the company. But from...more

Advanced Cyber Security Center Panel Explores Reasonableness in Cybersecurity

I had the pleasure of moderating an excellent panel at the Advanced Cyber Security Center’s annual conference on November 4. The panel’s topic for discussion was “What is Reasonable in Cybersecurity: Responsibility and...more

Data Subject Access Requests

A number of individuals made a data subject access request (DSAR) to a law firm for disclosure of all data held about them. It was accepted that the DSAR was made in the context of litigation, with a view to obtaining early...more

No Matter Where You Go, There You Are: How Employee Movements Cause Major E-Discovery Risk

We lose things. Keys, phones, remotes. When I was a kid, if I told my mom that I couldn’t find something, she’d reply, “If I go in your room and find it, you’ll be in big trouble,” so I’d rush back in and look everywhere...more

Socially Aware: The Social Media Law Update Volume 6, Issue 4

Five social media law issues to discuss with your clients - The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this...more

Reducing Your Company’s Exposure to Trade Secret Litigation when Key Employees Come and Go

THE NIGHTMARE SCENARIO - Within the span of two weeks, Mr. Smith and Mr. Wilson, two top managers from your $2 billion corporation, resign. Both managers had complete, unfettered access to your corporation’s trade...more

Middle Market Company Focus: Avoiding Emails that Hurt or Embarrass Your Company

Email communication is vital to just about every business. But in-house counsel know that what employees write in an email can come back to haunt their company. Womble Carlyle attorney Meredith McKee and Carolinas...more

The Big Move Toward Big Data in Employment

The world of Big Data has arrived, and it is beginning to affect employers and their decision-making in ways undreamed of even a few years ago. Employers can access more information about their applicant pool than ever...more

Business Litigation Alert: "Deflategate and Litigation - Lessons for Businesses"

Whether or not you’re a New England Patriots fan, the news about “Deflategate” seemed to be everywhere, along with opinions regarding the severity (or lack thereof) of the punishment. ...more

Cybersecurity Update - July 2015

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

It May Be A Lawyer Doing Work At A Law Firm…But Don't Call It 'Legal Work'

As e-discovery issues abound, the increased number of contract lawyers combing through massive document productions for privilege and relevance has developed into a cottage industry in the past decade. Companies helping law...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

Necessary Ingredients for Sound Legal Holds

Whenever e-discovery and healthcare litigation and investigations come up, you can almost always count on the topic to include a discussion of sanctions. That’s not an accident. There has been an uptick in both the volume of...more

Federal Employees’ Personal Information Compromised by Data Breach

In recent headlines, the Office of Personnel Management (“OPM”) has begun notifying millions of federal employees that it may have lost their personal information earlier this month in a data breach. The data breach...more

Amendments to Federal Rules of Civil Procedure: Is the Discovery Problem Solved?

Long anticipated changes to the Federal Rules of Civil Procedure were approved by the United States Supreme Court on April 29, 2015. Absent congressional action, which is not expected, these new rules will take effect...more

New Technologies Test the Limits of the Duty to Preserve, Collect and Produce Information in Civil Discovery

While the question of whether specific records are within a party’s possession, custody or control has been heavily litigated for years, the digital revolution — with the advent of social media, cloud computing and mobile...more

Status Updates: Facebook Posts—Reliable Evidence?; Quora Post Costs Applicant a Job; a New Ephemeral Messaging App

Facebook: Fact or fiction? These days, courts are more and more frequently faced with disputes over whether, as part of the discovery process, a litigant should be entitled to view the opposing party’s social media posts. As...more

E-Discovery Update: When Personal and Work Data Collide

In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more

Ediscovery Costs Affirmed in Termination Dispute (6th Circuit)

Colosi v. Jones Lang LaSalle Americas, Inc., 2015 WL 1186765 (6th Cir. Mar. 17, 2015). In this wrongful termination case, the plaintiff sought to challenge the bill of costs previously awarded to the defendant. The...more

Data Encryption and Its Potential Effect on Litigation and Discovery

In September 2014, Apple introduced a new mobile-operating system called iOS8. iOS8 offers enhanced data-encryption protection to Apple users and the content stored on their mobile devices. Apple's advancements in...more

Bring Your Own Device (Everywhere): Legal and Practical Considerations for International BYOD Programs

The cross-use of mobile devices for personal and professional purposes, commonly referred to as “Bring Your Own Device” or “BYOD”, is a relatively recent phenomenon that has created a host of legal and practical challenges...more

Takeaways for Employers on the Hillary E-mail Debacle

5 Reasons Employers Should Prohibit Employees From Using Personal Email Accounts - Recently, a political firestorm has erupted as news stories revealed that Former Secretary of State (and likely Presidential Candidate)...more

When Personal Email Is Serious Business

Hillary Clinton is currently under fire for the use of a personal email account while United States Secretary of State. Mrs. Clinton apparently exclusively (or nearly exclusively) used her personal email account while...more

Electronic Discovery: Beware of Employees Using Personal Email Accounts for Company Business

On March 3, 2015, the front page of the New York Times detailed allegations about an employee who failed to ever obtain a work-issued email account, instead utilizing a personal account solely to conduct all business...more

137 Results
View per page
Page: of 6

Follow Electronic Discovery Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.