Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
No need for blarney, we have six great cases! In our March 2025 monthly webinar of cases covered by the eDiscovery Today blog, we will discuss disputes related to sanctions over spoliated video evidence, quashing subpoenas of...more
While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more
As data volumes increase, the need to delete extraneous, irrelevant information is an essential component of modern information governance. Doing so defensively is at the heart of this process, and this presentation will...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more
In a recent ruling in Lopez v. Apple, Inc., Apple faced significant sanctions for failing to suspend its automated data deletion policy for Siri recordings after the initiation of litigation. This case is a reminder of the...more
No one else can “eclipse” our coverage of eDiscovery case law! Our April 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses disputes related to relevance and privacy of an unpublished autobiography,...more
So you’ve done the hard part already – you’ve identified the data subject to a litigation hold, you’ve placed it under that hold (and enforced it), and used that information for a case. But now, the case is over. So what do...more
Companies and firms alike have greatly expanded their usage of different communication and collaboration platforms during the past 3 years, ranging from email, Microsoft Office 365, Slack, Teams, ChatGPT, and others. These...more
California lawmakers recently passed a law that would expand data broker registration requirements and make it easier for consumers to be “forgotten.” The Delete Act, which would amend the state’s existing Data Broker...more
Your friendly neighborhood Technocat is back to shed some light on the captivating topic of legal hold notices. (Riveting I know!) The legal hold process for Electronically Stored Information (ESI) is a crucial step in the...more
So you’ve been under a litigation hold for awhile, but the case has concluded. So now what? Our presenters – experts in the legal, records management, and eDiscovery fields – will other places the data might be, the role of...more
Join John Price — Onna's Principal Technologist, to explore Onna's new Google Workspace enhancements, which include gathering deleted data and files and archived user data from Google Vault quickly and easily....more
It’s not a heat wave, it’s a wave of hot eDiscovery case law disputes! Our August 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a motion to compel a forensic examination...more
The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more
Justice delayed isn’t justice denied for eDiscovery case law disputes! Our July 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including custody and control of a personal Google...more
In Jennings v. Frostburg State University, 2023 WL 4205665 (D. Md. June 27, 2033), defendants wiped two cell phones of departing employees after the duty to preserve was triggered. The Court’s duty to preserve analysis –...more
Imagine the excitement you might feel when you hear that your company has finally decided to rid itself of a frustratingly antiquated electronic data management and storage system. Not only is the current system outdated, but...more
Employee data theft happens frequently, and especially in current times where employees are leaving or being terminated. Some may be due to layoffs while others may leave for personal or other reasons. However, there is...more
Nelson Mullins Partner Jarrett Coco and E-Discovery Collection Specialists Colin Duncan and Michael Scholz will outline new messaging features in iOS16, including the ability to edit and recall text messages and the ability...more
We often see more mobile devices come into our forensic lab than traditional computers (desktops and laptops). One reason for that is because mobile devices are consistently becoming more like computers. Device users can send...more
With people working remote and new data locations (cloud, collaboration apps, mobile, etc.) where relevant data to legal matters can be stored, it’s imperative that legal teams re-assess their legal hold processes. ...more
Remember the early days of email when there was such a thing as a clean and organized inbox? I remember I would even create separate folders and organize my messages according to themes. And then at some point, that effort...more
EDRM Ripped From the Headlines Webinar Series: In this fireside roundtable, guests, Jason R. Baron, former NARA and current Professor of the Practice at the University of Maryland and James and Jack Dever, cyber attorneys...more
Short, often informal messages have become an increasingly prevalent form of business communication. Whether by sending a simple text message or using a communication application like WhatsApp, Slack, or MS Teams, employees...more
Our 2022 Data Security Incident Response Report discussed how businesses can be better positioned to meet the tight data breach notification deadlines now imposed in dozens of countries worldwide. In particular, we...more