Everyone Come to Play: Exploring FOCI Mitigation Instruments
Legal Alert | Wiretap Laws in the United States
The ‘Long Arm’ of CIPA and Its Newfound Pen-Trap Claims
Episode 298 -- Electronics Communications Risks and Ephemeral Messaging
Compliant Business Communications Through Messaging Apps
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Employment Law Now IV-54- A Guest Discussion on 3 Significant Government Decisions
Discussion of PA’s Revised Uniform Fiduciary Access to Digital Assets Act
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
[WEBINAR] The Public Records Act - Taming the Email Tiger
Fed.R.Civ.P. 26(g) is called the “stop and think” rule. In Grullon v. Lewis, 2025 WL 1693425 (S.D.N.Y. Jun. 17, 2025), the court found a violation of that rule....more
In Gilbane Bldg. Co. v. School Bd. of Broward County, 2025 WL 1615553 (S.D. Fl. Jun 6, 2025), plaintiff moved to compel a “compliant” privilege log. The court decided six issues. The court wrote: “I agree that Defendant...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
[Editor’s Note: This article was first published December 21, 2023 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of...more
Mobile devices are everyone’s addiction, and each device could contain ESI essential to rounding out any discovery request. From text messages to device locations, from images to video and more, our mobile devices tell the...more