Latest Posts › Discovery

Share:

Taming the Privilege Log Beast

There are few things more dreaded in discovery than the time-consuming, tedious, onerous, beastly privilege log – especially in complex litigation matters involving thousands of pages of documents. These logs, however, are a...more

ChatGPT and E-Discovery: Match Made in Heaven or Rocky Roads Ahead?

Previously, I co-authored a two-part post on the advantages and disadvantages of using Technology Assisted Review (“TAR”) in E-Discovery document reviews. TAR helps attorneys during the review phase of E-Discovery by...more

E-Discovery Strategies For Handling Personal Identifying Information

We’re all familiar with the importance of avoiding the inadvertent disclosure of attorney-client communications, work product or sensitive, proprietary or confidential business information. However, our obligations don’t end...more

Navigating Social Media Retention and Collection During E-Discovery

Social media (“SoMe”) is so enmeshed in our daily lives it is difficult to imagine the time when we didn’t have it. Through our phones, computers and tablets, social media provides instant communication and connection, with...more

My My, What Big Claws You Have! Navigating the Pitfalls of Drafting Clawback Agreements

One of the greatest fears in any litigation matter is that you will somehow accidentally produce work product or attorney-client privileged documents to the opposing side and waive the privilege. As a result, it has become...more

Crafting Effective ESI Agreements

With the proliferation of workplace and personal electronically stored information (“ESI”) these days, it may be a scary proposition for any litigant to deal with the preservation, collection, review, and production of this...more

Technology Assisted Review: Or, How I Stopped Worrying and Learned to Love a Computer Program (PART TWO)

PART TWO: This is part two of a series on my journey to appreciating TAR. Part one addressed defined TAR, described how it worked and provided tips on when you should consider using TAR. Part two addresses the TAR process,...more

Technology Assisted Review: Or, How I Stopped Worrying and Learned to Love a Computer Program (PART ONE)

PART ONE: This is part one of a series on my journey to appreciating TAR. Be on the lookout for part two in the coming weeks. Recently, I (Russ Beets) began work on a complex litigation case that had millions of documents...more

BYOD (Bring Your Own Device) Policies and Best Practices

Some of us may remember a time when companies were not as concerned about where their information was maintained, as most of it was kept in some form or fashion in file cabinets or individual desks, or perhaps stored offsite...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide