Electronic Discovery Science, Computers & Technology

Read Electronic Discovery updates, articles, and commentary from leading lawyers, law firms, and legal consultants:
News & Analysis as of

Defendant Ordered to Provide Access to Licensee Websites

BNB Health Grades, Inc. ("Health Grades") filed a patent infringement action against MDx Medical, Inc., d/b/a Vitals.com ("MDx"). During the litigation, Health Grades identified licensing agreements and associated systems...more

Data Center Contracts: Privacy and Security Terms

A sometimes overlooked but potentially significant liability exposure for any company that uses the “cloud” to remotely store, process or distribute data is the service provider contract between the company user and its data...more

A Successful Motion for Additional Discovery in an Inter Partes Review

Countless parties to inter partes review can tell you how to lose a Motion for Additional Discovery. This is especially so for discovery motions seeking evidence to prove privity between the Petitioner and a third party in an...more

Alert: New Russian Law Will Require Personal Data of Russian Citizens to be Processed on Servers Located in Russia

In July 2014, Russian Federation President Vladimir Putin signed Federal Law No. 242-FZ (the "Law"), which amends existing Russian data privacy laws to require that personal data of Russian citizens be processed by servers...more

5 Questions You Should Ask about Big Data Security and Ediscovery

In the era of big data, vetting and asking the right security questions can help your organization save money and have peace of mind when it comes to ediscovery. Below is a general overview of some of the most important...more

How is the Venture Community Affected by the Criminalization of Trade Secret Law Under the Economic Espionage Act?

It's a commonplace occurrence in Silicon Valley for skilled employees to move from one company to another, followed quickly by a civil trade secret lawsuit alleging that the employee stole trade secrets from his prior...more

Top 10 Technology Blunders for Employers

As one who presumably has no nude selfies, you may not be too concerned about a “hack” like the one that continues to afflict celebrities like Jennifer Lawrence and Kate Upton. But that doesn’t mean there aren’t still plenty...more

Cybersecurity Litigation Monthly Newsletter

As we described in July and September, P.F. Chang’s was hit with three putative class actions following its announcement of a point-of-sale data breach. On August 29, P.F. Chang’s moved for dismissal of the first two cases,...more

Data Privacy: The Next Frontier of Corporate Compliance [Video]

Companies are collecting more and more personal data. With that collection is an increased responsibility and the potential for more government regulation. Attorneys Rick Martinez and Seth Northrop discuss the changes that...more

Court Denies Motion to Compel Deposition Testimony on Overly Broad 30(b)(6) Topics and on "Contention" Topics

In this patent infringement action brought by Trustees of Boston University ("BU"), BU alleged that defendants infringed U.S. Patent No. 5,686,738 (the "'738 Patent"), which centers on light emitting diodes ("LEDs") and the...more

Tread Lightly: eDiscovery Greed May Leave You With None At All

On July 14, 2014, the Court in United States v. University of Nebraska at Kearny (No. 4:11CV3209) took a significant step in support of Federal Rules 1 and 26. Magistrate Judge Cheryl R. Zwart denied plaintiff’s motion to...more

National Highway Traffic Safety Administration Considers Privacy Implications for New Vehicle-to-Vehicle Technology

The Department of Transportation’s National Highway Traffic Safety Administration (“NHTSA”) announced in 2014 that it would begin steps toward implementing vehicle-to-vehicle (“V2V”) technology with an aim toward decreasing...more

Court Rejects Exhibit Lists and Objections That Would "Require a Judge to Shovel Through Steaming Mounds of Objections" and Orders...

As this patent infringement action headed to trial, the district court scolded both parties for their exhibit lists and, in particular, the objections to the exhibit lists. The district court explained that "Affinity has...more

Delaware Data Destruction Law Highlights the Necessity of Data Destruction Plans

The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more

How EU data protection laws impact cross-border FCPA investigations

EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more

Are you—or someone you love—a content hoarder?

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Feds Pose Privacy Risk by Grabbing Overseas ISP E-mails

Microsoft Corp. is appealing the recent decision of U.S. District Judge Loretta A. Preska which requires the company to disclose the contents of e-mails stored at a data center in Dublin, Ireland, in compliance with a warrant...more

Brown v. Tellermate: Cloud-based Data and E-discovery

According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more

Keywords Vs. Technology-Assisted Review: Are They Mutually Exclusive?

Recently in Bridgestone Americas, Inc. v. International Business Machines Corp., U.S. Magistrate Judge Joe Brown of the Middle District of Tennessee addressed the plaintiff’s request to use technology-assisted review (TAR) on...more

Circuit Court Finds Failure to Provide Sufficient Evidence, Affirms Denial of Sanctions (Ohio)

Automated Solutions Corp. v. Paragon Data Sys., Inc., 2014 WL 2869286 (6th Cir. June 25, 2014). In this copyright infringement case, the plaintiff appealed a lower court’s ruling that denied the spoliation sanctions...more

Court Allows Plaintiff to “Switch Horses in Midstream” and Use Predictive Coding (Tennessee)

Bridgestone Americas Inc. v. Int'l Bus. Mach. Corp., No. 3:13-1196, 2014 BL 202049 (M.D. Tenn. July 22, 2014). In this ongoing case, the plaintiff sued the defendant for a $75 million computer system that it claimed...more

Confidentiality & Sealing Orders in Software Disputes

Two software companies wanted to integrate their software products. The relationship soured and one of the parties - McHenry - purported to terminate the Software Licensing and Development Agreement and then launched a...more

The Uber Playbook: 5 Best Practices for Protecting Data Privacy

The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more

Wearable Technology: A Perfect Fit For Litigation

It should come as no surprise that wearable technology and fitness trackers, such as Google Glass, the Jawbone UP, and the Narrative Clip are saturating the consumer market, and as a result, consumers are increasingly...more

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

321 Results
|
View per page
Page: of 13

Follow Electronic Discovery Updates on: