Science, Computers & Technology Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Court Rejects Exhibit Lists and Objections That Would "Require a Judge to Shovel Through Steaming Mounds of Objections" and Orders...

As this patent infringement action headed to trial, the district court scolded both parties for their exhibit lists and, in particular, the objections to the exhibit lists. The district court explained that "Affinity has...more

Delaware Data Destruction Law Highlights the Necessity of Data Destruction Plans

The list of states requiring the disposal or destruction of personal data is growing, and companies need to respond accordingly by adopting data destruction plans. Delaware recently became the latest in a series of states to...more

How EU data protection laws impact cross-border FCPA investigations

EU data protection laws apply to "personal data" in the broadest sense. For instance, a business email sent by an employee from the office constitutes "personal data" as long as the email directly or indirectly identifies an...more

Are you—or someone you love—a content hoarder?

Hoarding is defined clinically as embodying “a persistent difficulty discarding or parting with possessions because of a perceived need to save them.” That accumulation occurs regardless of the actual value associated with...more

Feds Pose Privacy Risk by Grabbing Overseas ISP E-mails

Microsoft Corp. is appealing the recent decision of U.S. District Judge Loretta A. Preska which requires the company to disclose the contents of e-mails stored at a data center in Dublin, Ireland, in compliance with a warrant...more

Brown v. Tellermate: Cloud-based Data and E-discovery

According to PC Magazine, “[i]n the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.” Cloud-based computing has become a very popular tool...more

Keywords Vs. Technology-Assisted Review: Are They Mutually Exclusive?

Recently in Bridgestone Americas, Inc. v. International Business Machines Corp., U.S. Magistrate Judge Joe Brown of the Middle District of Tennessee addressed the plaintiff’s request to use technology-assisted review (TAR) on...more

Circuit Court Finds Failure to Provide Sufficient Evidence, Affirms Denial of Sanctions (Ohio)

Automated Solutions Corp. v. Paragon Data Sys., Inc., 2014 WL 2869286 (6th Cir. June 25, 2014). In this copyright infringement case, the plaintiff appealed a lower court’s ruling that denied the spoliation sanctions...more

Court Allows Plaintiff to “Switch Horses in Midstream” and Use Predictive Coding (Tennessee)

Bridgestone Americas Inc. v. Int'l Bus. Mach. Corp., No. 3:13-1196, 2014 BL 202049 (M.D. Tenn. July 22, 2014). In this ongoing case, the plaintiff sued the defendant for a $75 million computer system that it claimed...more

Confidentiality & Sealing Orders in Software Disputes

Two software companies wanted to integrate their software products. The relationship soured and one of the parties - McHenry - purported to terminate the Software Licensing and Development Agreement and then launched a...more

The Uber Playbook: 5 Best Practices for Protecting Data Privacy

The risks are significant if managing sensitive data is not part of a proactive plan—the consequences can include penalties, sanctions and reputational damage....more

Wearable Technology: A Perfect Fit For Litigation

It should come as no surprise that wearable technology and fitness trackers, such as Google Glass, the Jawbone UP, and the Narrative Clip are saturating the consumer market, and as a result, consumers are increasingly...more

Foreign Data Center Subject to Reach of U.S. Government

Following the July 31, 2014 decision of a New York federal judge in In re Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corp., 1:13-mj-02814 (SDNY), U.S. companies should be aware that data...more

Court Denies Monetary Sanctions Based on Overdesignation of Documents As Confidential-Outside Counsel Eyes Only But Orders...

In this patent infringement action brought by plaintiff Trustees of Boston University ("BU") , BU alleged that defendants infringed U.S. Patent No. 5,686,738 (the "'738 Patent"), which pertains to light emitting diodes...more

Audit Trails: Pitfalls of Electronic Medical Records, Part III

I do not profess to be an expert in the complexities of metadata in an electronic medical record (EMR). In simple terms, it is analogous to leaving footprints in the sand; although these do not wash away with high tide. In...more

What’s in Your Wallet? Who Cares—What’s in Your Cell Phone Is More Important!

The United States Supreme Court has tackled the issue of cell phone privacy and ruled that data is different from other forms of technology. In late June, the Supreme Court issued an opinion: those of David Riley, a...more

Two Tips for Inventors Filing Patent Applications [Video]

The intense patent activity in graphene stems from its enormous technological and commercial potential. But because much of the territory underlying the graphene cross-roads has already been claimed, patenting graphene poses...more

Facebook: What Exactly are We Sharing When We Update Our Statuses?

Facebook’s newest feature may have you thinking twice about your status updates. However it’s not what you write that you should worry about, but rather where you write it. The social media giant has unveiled the latest...more

Status Updates - July 2014 #3

..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more

Fitting a Solution to Meet the Needs of a Workflow In-House

Your law firm just purchased a license for e-discovery software. Now what? Software implementations can be a substantial challenge for a variety of reasons, including lack of executive buy-in, poorly defined requirements,...more

ESI Discovery Best Practices, Part 3: You’ve identified ESI, now how do you go about collecting it?

My last blog generally addressed the rules applicable to best practices as to identification of Electronically Stored Information (ESI). Once the data identification process is complete, the next step is to determine...more

A Primer on Technological Advances in E-Discovery

“E-discovery is pervasive. It’s like understanding civil procedure. You’re not going to be a civil litigator without understanding the rules of civil procedure. Similarly, you’re no longer going to be able to conduct...more

Massachusetts High Court Permits Compelled Decryption of Seized Digital Evidence

Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more

Cloud Computing Is a Hot Topic… in Business and the Courtroom

Cloud computing sales are poised to triple by 2017, according to IHS Technology. With growth comes competition and the potential for disputes, both intellectual property-related and otherwise. This article surveys some of the...more

You Can Run, But You Can’t Hide From Sanctions in Discovery

In an October 2013 order in Digital Vending Services International, Inc. v. University of Phoenix, the judge refused to grant the defendants’ request for spoliation sanctions but punished the plaintiff for its disclosure of...more

311 Results
|
View per page
Page: of 13

Follow Science, Computers & Technology Updates on: