False Claims Act Insights - Is DOJ Allowed to Share Privileged Documents with Whistleblowers in FCA Disputes?
[Podcast] Defining Our Vision and Values
DE Under 3: OFCCP Walks Back Its Earlier “Pay Equity” Directive
JONES DAY TALKS®: International Litigation: Confidentiality and Legal Privilege under French Law
Writing a book as a Big Law partner - Legally Contented Ep. 2 - Christopher Ruhland
Internal Investigations in the Asia-Pacific Region
Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident
CyberSide Chats: Yes, you needed a cyber attorney a long time ago (with Erik Weinick)
Client Confidentiality in the Age of Coronavirus [More with McGlinchey Ep. 2]
Jones Day Presents: Strategies for Dealing with the IRS: The IRS Examination
Day 15 of One Month to Better Investigations and Reporting-the Parameters of Privileges
Day 2 of One Month to Better Investigations and Reporting-Selection of Investigative Counsel
Your Cyber Minute: Attorney-client privilege in the midst of a cybersecurity breach
Insurance Companies and the Attorney-Client Privilege in Arizona
Attorney Client Privilege
Polsinelli Podcast - Social Media at Work - What's Allowed and What Isn't?
Do You Need A Lawyer for a Federal Grand Jury Subpoena?
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 19-25. Here’s what’s...more
A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more
New year, new case law! In our January 2025 monthly webinar of cases covered by the eDiscovery Today blog, we will discuss disputes related to whether emojis constitute contract agreement, privilege status of text messages,...more
I have never heard of a “destruction/unavailable” log; however, in the comprehensive – indeed, exhaustive – decision of Leprino Foods Co. v. Avani Outpatient Surgical Center, Inc., 2024 WL 4488711 (C.D. Ca. Sep. 30, 2024),...more
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
In November of 2022, ChatGPT upended our thinking about artificial intelligence with a new form of machine learning called Generative AI (GenAI). Since then, discussions about GenAI models like GPT have taken center stage in...more
January is a time to set goals and ponder what the new year will bring. It is also a time to think about what happened last year. In the world of litigation, it is important for lawyers and eDiscovery professionals to take...more
The identification of privileged content remains one of the most time-intensive undertakings of any discovery project. In recent years, there have been significant developments in the ability to use analytics tools and...more
Our essential ediscovery glossary lays out all the ediscovery terminology every attorney should know. Attorneys are used to speaking in the complex language of the law, but technical ediscovery terminology can trip up...more
This post explains how to craft searches that get the results you're looking for in document review. We dive into the technical aspects of searching and provide ediscovery keyword search examples. ...more
Maybe you went into the law because you aren’t much of a tech person. You’re more of a big-picture thinker, hired as in-house counsel for your legal acumen, ability to strategize, and broad-based experience. You figure you...more
Identifying attorney-client privilege is one of the most costly and time-consuming processes in ediscovery. Since the dawn of the workplace email, responding to discovery requests has had legal teams spending countless hours...more