News & Analysis as of

Discovery Data Security Evidence

Minerva26

Requesting Cloud Data from Third Parties? Here’s What Every Litigator Needs to Know About the SCA

Minerva26 on

The way we communicate has changed dramatically in recent years, with businesses and individuals moving from traditional email to cloud-based collaboration platforms like Microsoft Teams, Slack, WhatsApp, Skype, and Telegram....more

HaystackID

[EDRM Workshop Transcript] Managing Data Overload and Complexity in Catastrophic Events

HaystackID on

Editor’s Note: Managing data effectively can make the difference between success and failure in high-pressure situations, such as natural disasters and international investigations. A recent EDRM workshop provided a rare...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

EDRM - Electronic Discovery Reference Model

[Webinar] eDiscovery Trends & Predictions: 2024 in Review and What to Expect in 2025 - November 14th, 1:00 pm - 2:00 pm ET

Staying ahead of the curve in legal tech and ediscovery requires knowing where the industry has been – and where it’s heading. In 2024, the pace of innovation brought new challenges and opportunities to ediscovery, from the...more

EDRM - Electronic Discovery Reference Model

August’s Notable Cases and Events in E-Discovery

[Editor’s Note: This article was first published August 21, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of...more

EDRM - Electronic Discovery Reference Model

Optimizing the Remote Reach: Strategies for Secure and Efficient Data Collection

The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more

Jones Day

Federal Court Grants the SEC Limited Access to the Identities of Law Firm Clients Impacted by a Cyberattack

Jones Day on

In Short - The Situation: Following a cyberattack on a law firm's systems, the Securities and Exchange Commission ("SEC") subpoenaed the firm for information, including the identity of clients whose information may have...more

EDRM - Electronic Discovery Reference Model

5 Steps to Protecting Ediscovery Data When an Employee Exits

Businesses are facing more uncertainty around talent and employee management than ever before. Whether it’s challenges around working from home, employee burnout, the “Great Resignation,” or the threat of recession-fueled...more

Association of Certified E-Discovery...

Legal AI Series [Chapter Two]: The Hurdles of Legal Document Review for Law Firms

For attorneys, “discovery” is the critical, information-gathering phase of a case. A time that’s spent collecting and reviewing evidence that will eventually become the building blocks for future arguments. In times of...more

TransPerfect Legal

Remote Forensic Collection: Considerations for a WFH Strategy

TransPerfect Legal on

TLS experts Jon Langton and Joseph Marra were pleased to be invited as guests on a podcast published by the International Legal Technology Association (ILTA). The episode, “Forensic Collections in a ‘WFH’ World,” features...more

Association of Certified E-Discovery...

[Webinar] Ask the Experts: Year-End Q&A with BIA - December 8th, 1:00 pm - 2:00 pm EST

2020 has been a year of significant change and adjustment, to say the least: the changes that the WFH era has inflicted on data management; the uptick in litigation across the board; layoffs, budget cuts, and the need to do...more

Association of Certified E-Discovery...

Departing Employees, Data Theft, and Digital Forensics

In late 2019, it was reported by Infosecurity Magazine that 72% of former employees admitted taking company data with them upon departure. Determining what actions a former employee took on a company device leading up to...more

Stange Law Firm, PC

New encrypted applications gaining prevelance

Stange Law Firm, PC on

In divorce and family law litigation, text, email and cell phone records are often important. In many cases, parties seek this evidence in discovery when it bears on relevant issues. Text, email and cell phone records can...more

Morrison & Foerster LLP - Social Media

Socially Aware: The Social Media Law Update Volume 6, Issue 4

Five social media law issues to discuss with your clients - The explosive growth of social media has clients facing legal questions that didn’t even exist a few short years ago. Helping your clients navigate this...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide