Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more
No need for blarney, we have six great cases! In our March 2025 monthly webinar of cases covered by the eDiscovery Today blog, we will discuss disputes related to sanctions over spoliated video evidence, quashing subpoenas of...more
As data volumes increase, the need to delete extraneous, irrelevant information is an essential component of modern information governance. Doing so defensively is at the heart of this process, and this presentation will...more
Your friendly neighborhood Technocat is back to shed some light on the captivating topic of legal hold notices. (Riveting I know!) The legal hold process for Electronically Stored Information (ESI) is a crucial step in the...more
The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more
Justice delayed isn’t justice denied for eDiscovery case law disputes! Our July 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including custody and control of a personal Google...more
In Jennings v. Frostburg State University, 2023 WL 4205665 (D. Md. June 27, 2033), defendants wiped two cell phones of departing employees after the duty to preserve was triggered. The Court’s duty to preserve analysis –...more
Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more
In a case that has particular salience in today’s era of social media, the Eastern District of Texas in Edwards v. Junior Sate of Am. Found., CIVIL NO. 4:19-CV-140-SDJ (E.D. Tex. Apr. 23, 2021), excluded screenshots and other...more
Lawyers are accustomed to slow, gradual changes that unfold over months, years, or even decades. Since our legal system depends on court precedents and democratic mechanisms for regulatory and legislative change, we typically...more
Since the first-generation iPhone model released in 2007, thirteen years have passed with more than twenty different style iPhones being released. With each model comes better hardware specs alongside newer features contained...more