News & Analysis as of

Electronically Stored Information

Press Delete, Go Directly to Jail? The Scope of the Computer Fraud and Abuse Act’s Damage Provision

by Foley & Lardner LLP on

Can deleting information, even personal information, from your work computer land you in prison? That was the central question posed in USA v. Zeng, Case No. 4:16-cr-00172 in the Northern District of California. Mr. Zeng...more

Understanding eDiscovery in Criminal Cases: eDiscovery Best Practices

by CloudNine on

...Criminal cases have long been thought of as an arena devoid of electronic discovery issues. In fact, in 2012 eDiscovery expert Craig Ball wrote in a column regarding the then recently published “Recommendations for...more

Boilerplate Objections

Judge Peck sends a warning shot to the bar about meaningless, repetitive boilerplate responses to document requests....more

No Sanctions for Spoliation of ESI Against Plaintiff Leads to Summary Judgment Against Defendant: eDiscovery Case Law

by CloudNine on

...In IBM v. Naganayagam, No. 15 Civ. 7991 (NSR) (S.D.N.Y. Nov. 21, 2017), New York District Judge Nelson S. Romàn, finding that no intent to deprive by the plaintiff and no prejudice against the defendant for spoliation of...more

2017 eDiscovery Case Law Year in Review, Part 4

by CloudNine on

...We grouped those cases into common subject themes and will review them over the next few posts. Perhaps you missed some of these? Now is your chance to catch up!...more

2017 eDiscovery Case Law Year in Review, Part 3

by CloudNine on

...Just because you don’t physically have your hands on the data doesn’t mean you’re not responsible for it. Here are three cases related to rulings regarding possession, custody and control of ESI, including one that relates...more

An End to Over-Preservation? An Expert Perspective on the FRCP

by Exterro, Inc. on

This blog post is adapted from commentary on Rule 37 by William F. Hamilton, Legal Skills Professor and Executive Director, UF Law E-Discovery Project Fredric G. Levin College of Law, University of Florida, in FRCP &...more

Google Puts Its SCA Warrant Appeal on Hold as High Court Prepares to Hear Microsoft Case

The fight over the privacy of electronic communications and the government’s ability to reach emails stored abroad in criminal investigations has finally moved to the U.S. Supreme Court. ...more

Self-authenticating evidence

Federal Rule of Evidence 902 amendments took effect on December 1, 2017. Kelly Twigger reviews the reactions to FRE 902, allowing self-authentication of ESI. Kelly quotes Craig Ball’s must-have’s for the affidavit...more

2017 eDiscovery Case Law Year in Review, Part 2

by CloudNine on

...Let’s take a look back at cases related to discovery about discovery, technology assisted review, form of production disputes, objections to production requests and an interesting dispute between an eDiscovery provider and...more

2017 eDiscovery Case Law Year in Review, Part 1

by CloudNine on

Once again, it’s time for our annual review of eDiscovery case law! This is our seventh annual review of cases that we covered on the eDiscovery Daily blog over the past year. As always, we had a number of interesting cases...more

How Not To Stub Your Toe On Pay Stub Claims

by Fisher Phillips on

Perhaps no law is a better example of California’s finicky wage and hour rules than Labor Code section 226, which governs the format, content, and issuance of pay stubs. Even well-intentioned and otherwise careful employers...more

Checklist of Top 10 E-Discovery Trends for 2018

by Zapproved LLC on

Tips to Empower Corporate Legal Teams to Achieve More Litigation Response Success in the Year Ahead - Are you ready for where e-discovery is going in 2018? Whatever your litigation process maturity level — what we call...more

Privacy Perils: Now You See Me ...

by Bass, Berry & Sims PLC on

In the ongoing and contentious litigation between Uber and Google's autonomous (self-driving) vehicle unit (Waymo v. Uber), allegations have arisen that one party has hidden relevant information, in part by use of...more

Your “Mashup” of eDiscovery Market Estimates Can’t Possibly Be Any Earlier: eDiscovery Trends

by CloudNine on

It’s become an annual tradition – the release of the eDiscovery Market Size Mashup that Rob Robinson compiles and presents on his Complex Discovery site each year. It’s also become an annual tradition for him to release it...more

Ancient ESI: A Survey of the Ancient Documents Exception

Should Titanic’s Box Office release or the debut of Harry Potter already be described as events from the ancient past? It would hardly seem so. But, the amendment to the ancient documents exception to the rule against hearsay...more

[Webinar] Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 - January 11th, 12:00pm CT

by CloudNine on

2017 was a very interesting year for eDiscovery case law and the impact of FRCP rules changes in 2015 became even more apparent. How can the key case law decisions affect discovery within your organization? This CLE-approved*...more

US v. Microsoft Litigation Provides the Supreme Court with a Rare Opportunity to Further Clarify and Define the Role of Comity in...

The United States Supreme Court recently granted certiorari in the landmark case of United States v. Microsoft Corp. This matter presents the Court with an opportunity to establish new precedent in the field of international...more

Two Truths and a Lie about Rule 16 Hearings

by Exterro, Inc. on

This blog post is adapted from commentary on Rule 16 by Hon. Xavier Rodriguez, U.S. District Judge, W.D. Texas, in FRCP & E-Discovery: The Layman’s Guide. One truth—not one of the two mentioned in our title—is that this...more

Privacy vs. Security: Will SCOTUS Leave the (Third) Party in 2018?

If the government obtains information about your past locations from your wireless provider, is that a search? If so, is it a search that requires the government to obtain a warrant? Courts have held that, because companies...more

4 Tips to Improve Efficiency in Managing Legal Projects

by Exterro, Inc. on

Over the past several years, the idea of “doing more with less” has gone from being an a bland statement on increased efficiency to becoming a reality that organizations have had to live with and ultimately embrace—and it’s...more

How Employers Can Become Experts at Data Breaches: Tossed Files

by Bryan Cave on

A large portion of the data breaches that occur each year involve human resource related information. Bryan Cave has put together a multi-part series to help human resource managers understand, prepare for, and react to, a...more

Five Things to Think About Before a Surprise SEC Exam

If a team from the SEC arrives at your office and says, “We are conducting an on-site examination and would like to talk to the CCO right now,” are you prepared? A handful of registered investment advisers have faced surprise...more

Organizing Those Old Boxes in the Attic: E-Discovery and the JFK Documents

If you have cleaned out an attic, you’ve probably run across a box of forgotten treasures. I remember some years ago when my mom sold the house I grew up in, she found a copy of the very first short story I wrote in the...more

Text Messages: Preservation Lessons for Mobile E-Discovery

There was a time when the only data you needed to collect in response to a discovery request was corporate email. Even if you received or sent work emails from your phone, this data would be located on a corporate server and...more

950 Results
|
View per page
Page: of 38
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.