News & Analysis as of

Data Collection Digital Data

Pagefreezer

Mitigating Chain of Custody Risks with Digital Evidence

Pagefreezer on

If you’re an attorney, a paralegal, an investigator, a law enforcement officer, or even if you just watch a lot of legal dramas on television, you’re likely familiar with the term “chain of custody”....more

Reveal

What is ESI? A Lawyer’s Guide to Digital Records Management

Reveal on

The International Data Corporation (IDC) estimates that by 2025, the world will have 175 zettabytes of digital data—which, if stored on DVDs, would create a stack tall enough to circle the earth 222 times. As organizations...more

Vinson & Elkins LLP

A Proactive Playbook in a Digital World: Managing Data Preservation In Software-Based Litigation

Vinson & Elkins LLP on

It’s an ever-present threat in our digital world: You get sued, and the case involves your software, website, and/or customer data. The first step in any filed or threatened litigation is to implement a litigation hold to...more

EDRM - Electronic Discovery Reference Model

Authentication of a Disputed Email and Attachment

Boshea v. Compass Marketing, Inc., 2023 WL 2743333 (D. Md. Mar. 31, 2023)(Hollander, J.), involved authentication of disputed electronically stored information. “Authentication” is a necessary predicate to all uses of ESI:...more

DarrowEverett LLP

The Litigation of Metadata – Your Devices Are Watching You

DarrowEverett LLP on

By using our smartphones, tablets and computers, we create and exchange a vast amount of electronic data every day, but what some may not know is that there is a whole other world of information hidden beneath the surface —...more

Nextpoint, Inc.

Don’t Let Self-Collection Spiral Into Self-Destruction: The Potential Pitfalls and Risks When Clients Collect their Own Data

Nextpoint, Inc. on

Read these ediscovery collection best practices to learn why self-collection – or allowing clients to collect their own data – is dangerous. Picture this: it’s 1988 and you’re at your desk, poring over a veritable...more

Association of Certified E-Discovery...

[Webinar] Generating Self-Authenticating Digital Evidence That’ll Hold Up in Court - October 8th, 1:00 pm - 2:00 pm ET

The submission of digital evidence traditionally required a sponsoring witness—something that could be time-consuming and expensive. Thankfully, as more and more online content, such as social media posts and chats, play a...more

McDermott Will & Emery

[Webinar] Around the Corner: Evolving Opportunities and Challenges for Real-World Evidence and Data-Powered Solutions - August...

McDermott Will & Emery on

Healthcare research has faced severe disruption during the COVID-19 public health emergency and underscored the need for novel technological solutions that harness and utilize data beyond traditional clinical research models....more

Skadden, Arps, Slate, Meagher & Flom LLP

Focus on Foreign Access to Technology and Data Continues as CFIUS — and Others — Flex National Security Muscles

With strengthened legislative mandates and significant regulatory reform in place, the U.S. government’s national security focus on protecting sensitive technology and data continues to gather steam. Although exactly what...more

Morrison & Foerster LLP - Class Dismissed

Internet of Things: Whose Data Is It Anyway?

The Internet of Things (IoT) is booming. Smart cars, wearable health trackers, connected medical devices, drones—entrepreneurs and evolving industry are connecting to the world in ways only science fiction writers imagined....more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide