Episode 5: Business Divorce, Delaware Style
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more
Safeguarding against evidence spoliation ahead of litigations, audits, or investigations is a lot easier when you have a timely, defensible legal hold process. In this conversation, take a look at how to achieve this by...more
A recent decision involving a business dispute over the sale of a company illustrates the standard a party must meet to compel designation of an ESI custodian: the judge denied the motion, finding it was the movant’s burden...more
Join us for a transformative webinar, "Legal Hold Made Easy: Building a Defensible Litigation Workflow," where we'll unravel the power of automated legal hold software to simplify and strengthen your litigation process. ...more
We’re ready to “spring” into new eDiscovery case law disputes! Our April 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a dispute over search terms and custodians for a...more
Tracking and maintaining a high custodian acceptance rate is imperative to the defensibility of your ediscovery process. For lean or otherwise bandwidth-strapped legal teams, chasing down custodians can quickly become...more
Our May monthly webinar of cases covered by the eDiscovery Today blog discusses disputes including third-party subpoena jurisdictional disputes, disputes over forensic imaging, the use of file “shredder” software and...more
Join us for an interactive panel discussion with members of the ACEDS Global Advisory Board....more
95% of all corporate investigations include message and conversation data as key evidence. When gathering this crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support...more
Tracking and maintaining a high custodian acceptance rate is imperative to the defensibility of your ediscovery process. For lean or other bandwidth-strapped legal teams, chasing down custodians can quickly become...more
The proliferation of short messages falling into the scope of discovery or disclosure is unabated. These can be mobile SMS texts or instant messages from popular applications such as WhatsApp, Viber, Slack, Skype and MS...more
One of the misconceptions that many people have about the EDRM model is that it represents only a linear flow for the order of discovery processes. People think that because the diagram seems to indicate an orderly flow to...more
In theory, issuing a legal hold is straightforward: draft the sternly-worded notice, hit send, and watch the receipts roll in. In practice, and without a well-defined process, it can be a quagmire of spreadsheets, flustered...more
What makes a great legal hold notification? We all know that legal holds are essential for ensuring evidence is preserved. But how do you get custodians to acknowledge legal holds the first time, not the tenth? And what would...more
ACEDS partners with Mandi Ross and Prism Litigation Technology to present an informational webinar that will present a new discovery workflow that operationalizes proportionality, provides defensible and transparent metrics...more
The main problem with discovery is the cost. In a very small number of truly bet-the-company cases (for example, where the CEO’s emails must be produced) the greater risk can be failing to do discovery perfectly. But 99 times...more
When it comes to producing documents in employment litigation, the deck is usually stacked in favor of the employee. Except in those unusual circumstances when the employee is squirreling away documents in an effort to build...more
Whenever e-discovery and healthcare litigation and investigations come up, you can almost always count on the topic to include a discussion of sanctions. That’s not an accident. There has been an uptick in both the volume of...more
As part of my ongoing discussion about ESI collection issues, I want to spend more time on the custodial interview process, because the interview is a critical part of any defensible collection. First, you must identify...more
Overview: A California appellate court recently ruled that, during the in camera review of peace officer personnel files following a Pitchess motion, the reviewing court must examine the actual records brought by the...more