Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
All Things Investigations: Episode 37 – Privileges in Document Production with Mike Huneke
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
So you are ready to divorce...what is the process?
Sitting with the C-Suite: In-House Counsel - Leveraging Text Classification to Problem Solve
Video | Tips for Managing the Preservation of Mobile Device Data
PODCAST: Williams Mullen's Benefits Companion - Government Investigative Demands
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
The success of any legal team relies on precise, timely, and compliant access to records. Yet, the demands of managing this process internally can detract from focusing on critical casework. A dedicated records retrieval...more
Legal professionals in cybersecurity, information governance, and eDiscovery face escalating data volumes, data security challenges, high eDiscovery costs, and information management inefficiencies. With AI-enabled workflows,...more
[Editor’s Note: This article was first published August 21, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of...more
Companies worldwide are witnessing a significant surge in law enforcement requests (LER), a trend that presents both a challenge and an opportunity for operational enhancement. For example, a comparison of Meta’s transparency...more
The enactment of China’s Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law (PIPL, together with the CSL and the DSL, “Data Security Laws”) has significantly reshaped the landscape of...more
On April 26, the second draft of the Data Security Law was submitted to the Standing Committee of the National People’s Congress for deliberation through May 28, 2021. Compared to the first draft submitted in July last year,...more
While most companies are adapting to the “new normal” that COVID-19 has forced upon us, there are still many challenges for businesses to overcome, particularly the way we now conduct due diligence in M&A deals. We outline...more
Federal authorities have recently described the threat of economic espionage from foreign entities as one of the greatest threats to the economic vitality of the United States, and this has led to an increase in...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more
Early last year, I posted about tougher, bi-partisan privacy and data security legislation in the works in North Carolina. North Carolina State Representative Jason Saine (R), Senior Appropriations Chair, teamed-up with North...more