Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
All Things Investigations: Episode 37 – Privileges in Document Production with Mike Huneke
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
So you are ready to divorce...what is the process?
Sitting with the C-Suite: In-House Counsel - Leveraging Text Classification to Problem Solve
Video | Tips for Managing the Preservation of Mobile Device Data
PODCAST: Williams Mullen's Benefits Companion - Government Investigative Demands
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
While record retrieval may sound like a straightforward task, legal professionals know it’s a complex, time-consuming process involving multiple entities, layers of rules and regulations, and security concerns (which...more
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
The enactment of China’s Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law (PIPL, together with the CSL and the DSL, “Data Security Laws”) has significantly reshaped the landscape of...more
Editor’s Note: On March 16, 2022, HaystackID shared an educational webcast developed to highlight insight into the world of active learning (AL) workflows through a combination of proven experience, expert processes, and...more
On 15 February 2021, the International Bar Association (the IBA) released its updated Rules on the Taking of Evidence in International Arbitration (the IBA Rules or the Rules). The updated Rules were adopted on 17 December...more
Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more
As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more
On June 25, a Federal District Court in Virginia (Anthony J. Trenga, U.S.D.J.) affirmed a Magistrate Judge's Order requiring Capital One to produce a vendor's post-breach forensic report to plaintiffs in a consumer class...more
A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more
The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more
Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
The Situation: In an era of sophisticated cyberattacks and data leaks, questions have been raised over whether the doctrine of legal professional privilege ("LPP") should be extended to provide clients with a legal right to...more
Early last year, I posted about tougher, bi-partisan privacy and data security legislation in the works in North Carolina. North Carolina State Representative Jason Saine (R), Senior Appropriations Chair, teamed-up with North...more
In the litigation between Equifax and Massachusetts Office of the Attorney General, Judge Sanders rejected certain provisions of Equifax’s proposed protective order for the production of sensitive discovery materials,...more
A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more