The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Innovations in Compliance: Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye
Early Days of the Trump Administration: Impact on the CFPB — The Consumer Finance Podcast
CFPB's Inquiry Into Payments Privacy — Payments Pros – The Payments Law Podcast
Innovation in Second Requests: Data is Your Greatest Asset
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
The Presumption of Innocence Podcast: Episode 48 - Digital Boundaries: Fourth Amendment Protections in a Connected World
eDiscovery Needs Digital Forensics for a Mobile World
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
EEO-1 Filing After June 4: What to Do Now, and How to Prepare for Next Year - Employment Law This Week®
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
Calculating eDiscovery Costs: Tips from Brett Burney
State AG Pulse | Content moderation vs. free expression
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
Navigating the Digital Frontier: Employee Privacy Rights and Legal Obligations in the Modern Workplace
In In Re: Uber Technologies, Inc. Passenger Sexual Assault Litigation, 2025 WL 678543 (Mar. 3, 2025), the court issued another hyperlinked document discovery decision arising out of the parties’ ESI Protocol. While...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 12-18. Here’s what’s...more
In Angelyn A. Olson et al. v. The Consilio LLC, et al. filed in Tarrant County, Texas, plaintiff Angelyn Olson alleged that she was involved in other litigation during which an e-discovery service provider (Consilio) was...more
Modern attachments, in Google Workspaces and Microsoft Office, have long posed significant challenges in eDiscovery. They are not actual files attached to an email or message but are links pointing to files stored elsewhere....more
The so-called “modern attachments” found in emails, collaboration software platforms like Slack and MS Teams, and other digital formats are presenting interesting and frustrating challenges for legal professionals in terms of...more
...Have your lawyers ever needed to rapidly triage emails already reviewed with emails received from other parties and it was just too expensive to reprocess all of the data to identify duplicates. If so, this webinar is for...more
My esteemed colleagues, Kelly Twigger and Doug Austin, both posted about a recent discovery decision out of a federal district court in Florida, case no. 8:23-cv-102-MSS-SPF, styled, Byte Fed., Inc. v. Lux Vending LLC. and...more
The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
[EDRM Editor’s Note: The opinions and positions are those of Craig Ball. This article is republished with permission and was first published on April 8, 2024.] Last week, I dug into Cloud Attachments to email, probing the...more
[EDRM Editor’s Note: The opinions and positions are those of Craig Ball. This article is republished with permission and was first published on March 29, 2024.] In the E-Discovery Bubble, we’re embroiled in a debate over...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of March 3-10. Here’s what’s...more
Love is in the air for eDiscovery case law! Our February 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses disputes over possession of devices, forensic examination of ESI sources in an IP case,...more
It’s time to be thankful – for eDiscovery case law! Our November 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses permissive inference sanctions for destruction of video, sanctions for failing to...more
It’s not a heat wave, it’s a wave of hot eDiscovery case law disputes! Our August 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a motion to compel a forensic examination...more
The International Data Corporation (IDC) estimates that by 2025, the world will have 175 zettabytes of digital data—which, if stored on DVDs, would create a stack tall enough to circle the earth 222 times. As organizations...more
[Editor’s Note: This article was first published June 14, 2023 and EDRM is grateful to Robert Keeling, Chair of the EDRM Global Advisory Council and our Trusted Partner, Sidley, for permission to republish.] This Sidley...more
[Editor’s Note: This article was first published May 17, 2023 and EDRM is grateful to Robert Keeling, Chair of the EDRM Global Advisory Council and our Trusted Partner, Sidley, for permission to republish.] This Sidley Update...more
Currently, no means of cross platform email duplicate identification exists. The EDRM Message Identification Hash (MIH) Specification takes a simple but effective approach to cross-platform email duplicate identification...more
Boshea v. Compass Marketing, Inc., 2023 WL 2743333 (D. Md. Mar. 31, 2023)(Hollander, J.), involved authentication of disputed electronically stored information. “Authentication” is a necessary predicate to all uses of ESI:...more
Discovery is the largest time and cost component of civil litigation. As the volume of documents in scope increases exponentially, teams need to manage them as “quickly, inexpensively, and efficiently as possible” (to quote...more
You are invited to join EDRM’s Email Duplicate Identification Global Project Team as they share how they have solved the painful and oftentimes expensive process of duplicate identification across emails processed by multiple...more
The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more
In ediscovery, most of the information collected during litigation involves email and other communication data (e.g. Slack and MS Teams). But the growing use of SaaS applications adds an additional element to the blanket term...more