Science, Computers & Technology Electronic Discovery

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

Two Tips for Inventors Filing Patent Applications [Video]

The intense patent activity in graphene stems from its enormous technological and commercial potential. But because much of the territory underlying the graphene cross-roads has already been claimed, patenting graphene poses...more

Facebook: What Exactly are We Sharing When We Update Our Statuses?

Facebook’s newest feature may have you thinking twice about your status updates. However it’s not what you write that you should worry about, but rather where you write it. The social media giant has unveiled the latest...more

Status Updates - July 2014 #3

..A relatively new site called Wanelo combines the features of a social media site and an e-commerce site by permitting users to “save” products that they are interested in, and showing them to their online friends. The site...more

Fitting a Solution to Meet the Needs of a Workflow In-House

Your law firm just purchased a license for e-discovery software. Now what? Software implementations can be a substantial challenge for a variety of reasons, including lack of executive buy-in, poorly defined requirements,...more

ESI Discovery Best Practices, Part 3: You’ve identified ESI, now how do you go about collecting it?

My last blog generally addressed the rules applicable to best practices as to identification of Electronically Stored Information (ESI). Once the data identification process is complete, the next step is to determine...more

A Primer on Technological Advances in E-Discovery

“E-discovery is pervasive. It’s like understanding civil procedure. You’re not going to be a civil litigator without understanding the rules of civil procedure. Similarly, you’re no longer going to be able to conduct...more

Massachusetts High Court Permits Compelled Decryption of Seized Digital Evidence

Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more

Cloud Computing Is a Hot Topic… in Business and the Courtroom

Cloud computing sales are poised to triple by 2017, according to IHS Technology. With growth comes competition and the potential for disputes, both intellectual property-related and otherwise. This article surveys some of the...more

You Can Run, But You Can’t Hide From Sanctions in Discovery

In an October 2013 order in Digital Vending Services International, Inc. v. University of Phoenix, the judge refused to grant the defendants’ request for spoliation sanctions but punished the plaintiff for its disclosure of...more

Avoiding the Digital Dark Age and Remaining Competitive

In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more

Avoiding Litigation: What Every Growing Company Should Know Now — Before It Is Too Late

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

Who Is at Fault When a Driverless Car Is in an Accident?

One author's view on how to determine the answer that may surprise you....more

Are You Facing the Prospect of a Merger Investigation?

If your organization is facing the prospect of a merger investigation and your lawyers haven’t raised the prospect of technology-assisted document review (“TAR”), then maybe you should be talking with someone...more

Do You Know Where Your Data Went? Best Practices for Preserving Electronically Stored Information

A federal judge in Illinois recently ordered a large pharmaceutical company to pay nearly $1 million because when the business was sued, it failed to remind its sales representatives to preserve text messages. Last year, a...more

Love, But Don’t Leave, Your Litigation Holds

If your company is like many organizations, once a legal hold is set in motion, it becomes yesterday’s news…and is promptly forgotten about in favor of more pressing matters. After all, at its essence, a litigation hold is...more

Heartbleed Won’t Bring Cardiac Arrest for Ediscovery

How do you stop a security professional’s heart from beating? Two words: security breach. In today’s “Internet of Everything” environment, the impact of a security breach can be felt around the world and back again…in...more

Cybersecurity Is Not Just an IT Issue; It’s an IG Issue

For leaders and counsel in many organizations, the word “cybersecurity” typically triggers concerns about the IT department, conjuring images of hackers and requiring unfamiliar terminology such as “firewalls” and...more

Bitcoin: A Tale of Digital Trails

Once thought of as an anonymous method of buying and selling goods and services, Bitcoin users and researchers are increasingly aware of the inherent limits of anonymity in the context of Bitcoin use. Similar to any other...more

EDRM Releases A New Model For Analyzing Private Data

Recent high-profile data breaches have placed security of personally identifiable information (PII) at the forefront of many organizations’ concerns. Protecting PII and other private data can be a significant undertaking....more

Dear Mr. Snowden: Is it reasonable to expect my attorney-client communications are confidential?

Last month, Edward Snowden provided the press a document describing “how Australian intelligence conducted surveillance of trade talks between Indonesia and the United States and, in the process, monitored communications...more

To Native or Not to Native, That Is the Question

Here at IT-Lex, we write a lot about the form of producing documents. (For instance, see here, here, here, and here) Producing in TIFF format has long been the standard-bearer in electronic discovery, while PDFs are a...more

Predictive Coding Semantics: Step out of the Rain!

A few years ago, we wrote about predictive coding going mainstream; shortly thereafter we wrote a series debunking the most common myths about predictive coding; then, we even went so far as to break down predictive coding...more

How the 'Internet of Things' Will Impact eDiscovery

Big data is only going to get bigger, my friends....more

How the ‘Internet of Things’ Will Impact Data Security and Privacy

Who ultimately owns the data? How will your data be shared? Wouldn’t health insurance companies love access to your fit monitor data to set their premiums?...more

The Spoliation of Text Messages

In the era of Twitter and Instagram, it should come as no surprise that a party’s cell phone data, including text messages, may prove invaluable to an adverse party during the course of litigation. As with any other...more

295 Results
|
View per page
Page: of 12

Follow Science, Computers & Technology Updates on: