Why Lawyers Can't Ignore eDiscovery
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
To Unlock AI’s Power, Think Predictive to Generative
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
eDiscovery for the Rest of Us: Why Small Firm eDiscovery Matters
The Great Link Debate and the Future of Cloud Collaboration
Why Your eDiscovery Program and Technology Need Scalability
Bar Exam Toolbox Podcast Episode 237: Listen and Learn -- Discovery (Civ Pro)
#CaseoftheWeek with Kelly Twigger: Latin Markets Brazil, LLC v. McArdle
Podcast - Inteligencia Artificial
LFLM LAW with L.A.W - Discovery for Covid-19 Claims
Chemical Engineering Expert Witness Experience & Discovery – IMS Insights Podcast Episode 48
JONES DAY PRESENTS®: The Mechanics of Multidistrict Litigation: Streamlining Complex Cases
Bar Exam Toolbox Podcast Episode 204: Listen and Learn -- Scope of Discovery and the Work-Product Privilege
A Look at the Metaverse’s Legal Implications, with Special Guest Samantha Green, Director of Content Marketing, Epiq
Recent Trends in Class-Action Consumer Finance Litigation - The Consumer Finance Podcast
Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more
Defining the role of inherent risk in cybersecurity - Inherent risk is a concept that while fundamental to cybersecurity, has largely been disregarded by popular cybersecurity risk guidelines and standards and remains arcane...more
Gabe Landau, Vice President of eDiscovery & Incident Response Solutions for EDRM Trusted Partner HaystackID, sits down with Kaylee and Mary to talk about his journey to eDiscovery, from the Amazing Race and Fear Factor to Net...more
eDiscovery professionals are information professionals and vital to that broader community. Working within the broader context of your organization, it becomes critical to have an information governance program in place to...more
In the digital age, law firms have faced increased pressure to protect exponentially growing amounts of data under their management, especially since they have become major targets for bad actors seeking to profit by stealing...more
Harnessing the power of forensically sound remote collection is essential to eDiscovery investigations. As the scope and volume of data that must be reviewed increases, so does the cost of eDiscovery. No matter where...more
With the number of cyber incidents skyrocketing, dealing with a data breach has become an all-too-common experience. In 2022 alone, there were over 500 million cyber-attacks and of these entities over 60 percent were attacked...more
From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more
When your organization experiences a cyber-attack, you are not alone. The digital age presents more opportunities for hackers to breach information than ever before. According to the Identity Theft Resource Center, as of...more
In the fast-moving industry of cyber incident response, success and efficiency come from preparation. Once a matter is promoted to review, the most common request for timing is “as soon as possible.” How is a client’s desire...more
Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
The Arkansas Court of Appeals recently affirmed the critically important quality-assurance privilege in Arkansas, codified at Arkansas Code Annotated section 16-46-105. At issue was whether a hospital must convene a formal...more
The number of data breaches is soaring every year. We hear the headlines for the big corporations – like Google, Facebook and Quora – that are affected. But it impacts organizations of all sizes. In fact, the majority of data...more