Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Data Retention and Document Holds
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
No Password Required Podcast: Senior Security Researcher at Nokia and Guardian of Secure AI Networks
eDiscovery Needs Digital Forensics for a Mobile World
Work This Way: A Labor & Employment Law Podcast - Episode 31: Trade Secrets and Protecting Confidential Information with Jennie Cluverius of Maynard Nexsen
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Record Retention and Information Governance
California Employment News: Synthesizing Evidence in a Workplace Investigation (Part 3)
A Look at the Metaverse’s Legal Implications, with Special Guest Samantha Green, Director of Content Marketing, Epiq
Evidence Preservation: Handling the Issues in New York and New Jersey
Keeping Up with M365 Software Updates
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: Remote Work - Increasing Communication on Collaboration Platforms
Video | Tips for Managing the Preservation of Mobile Device Data
On Thursday, April 10, 2025, legal and technology professionals gathered at Arnold & Porter in Washington, D.C. for an inspiring day of discussion, collaboration, and community during The Masters Conference Thought Leadership...more
Whether we refer to them as “linked documents” or “modern attachments,” gathering the information contained in these files poses an increasing challenge in the ever-evolving e-discovery landscape. I had the privilege of...more
One of the best indicators of trends related to mobile device discovery is case law rulings. Case law rulings tell us what the courts are expecting from us regarding how and when electronically stored information (ESI) from...more
During a panel on trial practice at the recent Masters’ Conference in Los Angeles, moderated by Professor Shannon Bales, panelists emphasized the critical role of consistency—blending humor, real-world anecdotes, and...more
These days, ignoring social media evidence in investigations and litigation is akin to leaving a crucial witness unquestioned. But as the case of Federico v. Lincoln Military Housing demonstrates, navigating this terrain can...more
For years, litigators focused on emails and corporate documents as the primary sources of discoverable evidence. But the way people communicate has changed. Today, crucial case evidence is just as likely—if not more likely—to...more
Recent developments in eDiscovery case law highlight significant trends legal counsel, eDiscovery professionals, and business leaders should keep an eye on, including the growing complexity of privilege assertions, the...more
By definition, a litigation hold notice is a communication from an attorney to a client regarding the duty to preserve potentially responsive information. In Homeland Ins. Co. of Del. v. Independent Health Ass’n., Inc., 2025...more
As mobile devices continue to integrate seamlessly into our professional and personal lives, the boundaries between business and personal data have blurred significantly. This evolution has introduced a host of legal...more
The question of how to handle “modern attachments” has become a hot topic that’s swept the ediscovery landscape over the past year. Major litigation involving Uber Technologies has led to extensive conversations on how to...more
In today’s digital world, the way we handle information has transformed dramatically. With this transformation, eDiscovery has become an essential part of legal proceedings and investigations. Whether you’re involved in a...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 19-25. Here’s what’s...more
Seven years ago, I wrote an article about what I called the eDiscovery Disconnect—the gap between the work being done on data and the legal strategy that drives discovery. Unfortunately, not much has changed since then, but...more
We live in an era of ‘big data.’ According to the International Telecommunications Union, more than three-quarters of the world’s population own a mobile phone. The same statistics apply for computer and internet use....more
Having taught Federal Rule of Evidence 502 (FRE 502) in my law classes for over a decade, I felt I had a firm grasp of its nuances. Yet recent litigation where I serve as Special Master prompted me to revisit the rule with...more
In Ex-Prosecutor Disbarred For Fabricating Harassing Texts – Law360 (Jan. 7, 2025), Thy Vo reported on a fabrication of evidence case. The decision, State of Colorado vs. Yujin Choi, No 24PDJ019, is not yet posted on Recent...more
Social media has changed the way we share ideas, the way we get our news, the way we make purchases, and the way we conceptualize ourselves and our community. It has changed the way we keep in touch with our friends and...more
County police officers were investigating a theft of farm equipment. They applied for a “geofence warrant” to be served on Google: “A geofence warrant authorizes the seizure of location data collected from smartphones of...more
Whether you're the plaintiff or the defendant, it takes evidence to win court cases. That’s why preserving and protecting relevant information through legal holds is paramount....more
According to Norton Rose Fulbright’s 2023 Annual Litigation Trends Survey, corporations spend an average of $1.7 million on legal disputes for every $1 billion in revenue they earn. With much of that spending going toward...more
In our adversarial justice system, litigants rely on evidence to explain their side of a dispute. Today, much of that evidence is digital. If an organization allows digital evidence to be compromised, lost, or destroyed, it...more