Why Lawyers Can't Ignore eDiscovery
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
eDiscovery for the Rest of Us: Why Small Firm eDiscovery Matters
Systems And The Emergence Of AI In Law Practice | Ernie Svenson | Texas Appellate Law Podcast
Closing the Deal: Deploying the Right AI Tool for HSR Second Requests
Achieving Cross-Matter Review Discipline, Cost Control, and Efficiency
eDiscovery Review: Family Vs. Four Corner
Law by SKU
Sitting with the C-Suite: Embracing Remote Reviews During COVID
Sitting with the C-Suite: How In-House Counsel Can Merge eDiscovery Preferences
Sitting with the C-Suite: Finding Synergistic Opportunities in the eDiscovery Market
Sitting with the C-Suite: COVID-19 - Accelerating Change in the Legal Industry
Sitting with the C-Suite: The Impact of Procurement and Legal Operations Professionals Selecting Managed Service Providers
Sitting with the C-Suite: How to Integrate Managed Service Providers to Problem-Solve
Sitting with the C-Suite: Background in Developing eDiscovery Solutions
Sitting with the C-Suite: Bringing It All Together for Customer Experience
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
Sitting with the C-Suite: Trial Teams – Narrowing Data through Centric Search
Artificial Intelligence – Why it matters now
Document Review: An Unheralded Entrance into the Legal Profession
[Editor’s Note: This article was first published July 24, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
The purpose of a privilege log is to provide sufficient information for the recipient of the log to determine whether the withheld information is, at least on its face, privileged. In short: “Trust, but verify.” See,...more
Get ready for some epic showdowns as Chicago ACEDS and Cimplifi present The Great eDiscovery Debate on July 16th!...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
Privilege logs have been getting a lot of attention, with good reason. “Privilege logging is arguably the most burdensome and time consuming task a litigant faces during the document production process.” The Sedona...more
It’s never too early in the year for eDiscovery case law! Our January 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses Rule 45 subpoena requests, in-camera review and categorical privilege logs,...more
January is a time to set goals and ponder what the new year will bring. It is also a time to think about what happened last year. In the world of litigation, it is important for lawyers and eDiscovery professionals to take...more
In modern litigation, more and more cases involve massive volumes of electronic data at the discovery phase, leaving legal teams to wade through a sea of documents to uncover relevant evidence. All this noise in the data can...more
The ESI protocol is a negotiated document that expressly states how the parties to a litigation should produce electronically stored information (ESI). The ESI protocol assures against surprises and commands that ESI is...more
DOC REVIEW PART II: ORGANIZING YOUR EVIDENCE & PROTECTING PRIVILEGE - Before we get too deep into our three part series on Document Review, let’s ask, why is document review even necessary? According to Rule 26 of the...more