Latest Publications

Share:

New Cases Bring Lessons on Video Surveillance Preservation

Video surveillance is ubiquitous today and often sought in connection with injuries or litigation. As a result, courts are increasingly presented with disputes relating to the preservation and production of surveillance...more

Protecting Privilege When Communicating With Contractors

As more businesses rely on independent contractors and specialists, the courts continue to define where those independent contractors fit for purposes of the attorney-client privilege. Here we discuss recent decisions...more

Protecting Privilege When Communicating With PR Consultants

In high-profile cases in 2001 and 2003, federal courts recognized exceptions to the third-party waiver rule for privileged communications shared with public relations (PR) consultants. Since then, courts have repeatedly been...more

What Is a 'Reasonably Useful Form' for Production of ESI?

In our digital world, one might think that the production format of electronically stored information, or ESI, in civil litigation is no longer controversial, but recent court decisions make it clear that is not the...more

Spoliation Rule Remains Ambiguous Despite Amendments

Pursuant to Federal Rule of Civil Procedure 37(e)(2), imposition of the most severe sanctions for failure to preserve relevant electronically stored information — a presumption that the information lost was unfavorable, an...more

New Best Practices Under E-Discovery Spoliation Rule

As the volume of electronically stored information, or ESI, subject to discovery has exploded, allegations of spoliation have multiplied. Before the 2015 amendments to the Federal Rules of Civil Procedure, courts relied on...more

Evaluating Stand-Alone Privilege for Cybersecurity Info

With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more

How Courts Are Treating Cellphone Privacy in Discovery

Cellphones are an essential part of our daily lives, and our frequent usage has produced large amounts of personal data. It is unavoidable that some of this data — be it email, text message or even GPS location data — may be...more

Fresh Takes on Seeking Costs and Fees Under Rule 45

Recent case law reveals that courts vary widely in their approaches to shifting the costs and fees incurred in responding to a Federal Rule of Civil Procedure 45 subpoena. Originally published in Law360 - February 12,...more

Does Rule 45 Protect Nonparties From Undue Burden?

Parties can serve subpoenas seeking discovery from nonparties pursuant to Federal Rule of Civil Procedure 45. Originally published in Law360 - October 2, 2018. ...more

When Electronic Records Disappear But Legal Issues Linger

In December 2017, the Sunshine Project sued Missouri Governor Eric Greitens, alleging violations of the Missouri Open Records and Open Meetings Law because he and his staff used Confide, an “ephemeral” messaging app that...more

Negotiating the Tension Between Transparency and Privacy

Making individual patient-level data available for other research presents companies with challenges, but researchers and companies can take steps to minimize the risks. Originally published in Drug and Medical Device,...more

Right to Try Legislation: Worthwhile or Window Dressing?

"Right to Try" legislation, which enables terminally ill patients or patients with a "life threatening disease or condition" to seek access to investigative drugs with little to no oversight from the FDA, has been enacted in...more

From Snaps to Tweets: The Craft of Social Media Discovery

Social media may contain a treasure trove of evidence bearing on claims in litigation, but parties must take care to tailor their discovery requests to information that is both relevant and proportional to the needs of the...more

Protecting the Privacy of Privileged Internal Investigations

Internal investigations by outside counsel are an essential tool for corporations to ensure they are compliant with governing regulations and statutes, particularly when they are faced with allegations of potential...more

Protecting Communications From PR Privilege Issues

Two recent cases in state appellate court show the risks of sharing privileged communications with public relations consultants. But they also provide practical guidance on how to protect the confidentiality of...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide