Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
All Things Investigations: Episode 37 – Privileges in Document Production with Mike Huneke
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
So you are ready to divorce...what is the process?
Sitting with the C-Suite: In-House Counsel - Leveraging Text Classification to Problem Solve
Video | Tips for Managing the Preservation of Mobile Device Data
PODCAST: Williams Mullen's Benefits Companion - Government Investigative Demands
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
The success of any legal team relies on precise, timely, and compliant access to records. Yet, the demands of managing this process internally can detract from focusing on critical casework. A dedicated records retrieval...more
As the volume of electronically stored information, or ESI, subject to discovery has exploded, allegations of spoliation have multiplied. Before the 2015 amendments to the Federal Rules of Civil Procedure, courts relied on...more
The United States Department of Justice (DOJ) is authorized by the False Claims Act (FCA) to issue Civil Investigative Demands, commonly known as CIDs. 31 U.S.C. § 3733. The DOJ has made increasing use of CIDs to obtain...more
What Is It? A two-year pilot scheme running in certain divisions of the English High Court, designed to reduce the volume of disclosure documents (discovery) produced in English litigation. What Will It Mean? In some...more
Most commercial litigators are familiar with the process for responding to a subpoena demanding the production of documents from a non-party to litigation under Federal Rule of Civil Procedure 45. But interesting...more
While your organization may not regularly be involved in costly or complicated litigation, there is always the potential for this to arise. Additionally, you may work in an industry that is heavily regulated and subject to...more
•GHOST/MIRROR: Complete bit by bit copy of a drive. (Not just copying data; actually reproducing the hard drive.) •LEGACY: Information from older systems no longer actively supported and not easily accessible. ...more
In this issue: - The Firm’s Ediscovery Team Attorneys - Case Insights - Editor’s Corner - Excerpt from Peerless Industries, Inc. v. Crimson Av, LLC, Case No. 1:11-cv-1768, 2013 U.S. Dist. LEXIS...more