Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
To Unlock AI’s Power, Think Predictive to Generative
Work This Way: A Labor & Employment Law Podcast | Episode 15: eDiscovery for Employers with Angela O’Neal, Nextra Solutions Director
Calculating eDiscovery Costs: Tips from Brett Burney
eDiscovery for the Rest of Us: Why Small Firm eDiscovery Matters
Managing Large Scale Review Efficiency: Tips From a GC
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Using Technology in the Courtroom
The Great Link Debate and the Future of Cloud Collaboration
Why Your eDiscovery Program and Technology Need Scalability
#CaseoftheWeek with Kelly Twigger: Latin Markets Brazil, LLC v. McArdle
Podcast - Inteligencia Artificial
Systems And The Emergence Of AI In Law Practice | Ernie Svenson | Texas Appellate Law Podcast
What Does Artificial Intelligence Mean for Ediscovery Jobs? | Eye on ESI: A.I. Edition
Review Analytics for a New Era
AI has the potential to transform the criminal justice system through its ability to process vast datasets, recognize patterns, and predict outcomes. However, this potential comes with a profound responsibility: ensuring that...more
Electronic information in various forms is now a common feature in the investigation and prosecution of crimes. The search for and use of that information presents issues under the Fourth, Fifth, and Sixth Amendments as well...more
Once a company or individual learns they are a target of a Federal Trade Commission investigation, they need to quickly make a series of decisions, then take action. After being notified that the FTC has begun an...more
In a recent case decided by the Appellate Division in New Jersey, Facebook, Inc. v. State of New Jersey, the court considered whether communication data wire warrants (“CDWs”) or wiretap orders had to be served on Facebook...more
Something identified in the course of normal eDiscovery often turns a case into a forensics investigation. In a recent webinar, we examined several case studies, and here we dive a little deeper into one of the examples...more
Several federal agencies rely on search warrants to gather evidence in support of their law enforcement efforts. If you have received a search warrant from the Federal Bureau of Investigation (FBI), Drug Enforcement...more
There were plenty of things happening in the world of eDiscovery this year, and the Ipro Newsroom was there to cover it – Here are our top 10 articles of 2019! ...more
The Georgia Supreme Court ruled that the retrieval of electronic automobile data from an electronic data recording device (e.g., airbag control modules) without a warrant at the scene of a fatal collision was a search and...more
Once again, eDiscovery and emerging data sources are at the center of a criminal murder investigation. A recent article in Wired highlights how investigators used data from the victim’s Fitbit and a neighbor’s Ring digital...more
Two recent murder cases have again highlighted the use of electronic forensics to solve cases that only a few decades ago, would have been difficult to crack in the relatively short time frame between the crime and the...more
Yesterday, the Georgia Supreme Court is set to hear oral argument in an appeal brought by a defendant convicted of vehicular homicide and other charges related to a fatal car crash. (Mobley v. State, No. S18C1546). The...more
Here’s a scenario that might be common enough in your day-to-day life: imagine that you’ve misplaced your wallet. (Apparently, Americans do this a lot. Statistics show we spend two and a half days each year looking for...more
Recently, Amazon refused (registration required) to provide data from an Amazon Echo device in a case involving the a double homicide in response to an order issued by a New Hampshire state judge. Prosecutors believe that the...more
For many legal practitioners, Asia remains a legal challenge, “whether it’s the different data sources, the lack of familiarity with case law or an understanding of the legal landscape in different countries, from Hong Kong...more
Just over four years ago, in January 2014, a court sentenced former Korn/Ferry regional director David Nosal to one year and one day in prison for violations of the federal Computer Fraud and Abuse Act and the Espionage Act. ...more
Can deleting information, even personal information, from your work computer land you in prison? That was the central question posed in USA v. Zeng, Case No. 4:16-cr-00172 in the Northern District of California. Mr. Zeng...more
The U.S. Supreme Court, which just began a new term on Monday with a full complement of nine justices, is expected to soon decide whether it will hear the appeal of David Nosal, the former Korn Ferry executive whose...more
The warrant that led to the arrest of a husband for the alleged murder of his wife weaves a web of electronic evidence. Based in large part on Fitbit fitness tracker data, Connecticut authorities have charged Richard Debate...more
Police in Bentonville, Arkansas are seeking records from an Amazon Echo device (for the second time) which may contain records in connection with a murder investigation in the home of James Andrew Bates where Victor Collins...more
On October 14, the US Department of Justice's Antitrust Division announced that Ralph Groen, a former information technology executive of the bus operator Coach USA Inc., had pleaded guilty to criminally obstructing justice...more
Last month, the Ninth Circuit affirmed the criminal conviction of an individual for accessing a computer “without authorization” in violation of the Computer Fraud and Abuse Act (“CFAA”). U.S. v. Nosal (9th Cir., July 5,...more
In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more