eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Key Discovery Points: Timing is Mostly Everything in eDiscovery
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
How Attorneys’ Views on AI Are Impacting eDiscovery
Key Discovery Points: Get Your Objections In Early – and Keep Your Filings Succinct
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
Firma digital y firma electrónica, parecidas … pero diferentes
eDiscovery Needs Digital Forensics for a Mobile World
Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
In Lively v. Wayfarer Studios LLC, 2025 WL 662896 (S.D.N.Y. Feb. 28, 2025), the court granted in part and denied in part a motion to quash subpoenas issued to AT&T, Verizon, and T-Mobile (the “Wayfarer Parties”) by Ms. Blake...more
Editor’s Note: On March 17, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how organizations are preparing and responding to increasing security and...more
With 2018 in the archives, Hanzo is starting off the new year with a look ahead to the trends and challenges we believe will define the compliance and eDiscovery landscape in 2019, and a look back at the year that was at...more
In October 2017, the Supreme Court granted the Department of Justice’s petition to review the Second Circuit’s decision that limits the reach of warrants issued under the Stored Communications Act (“SCA”). Specifically, the...more
If the government obtains information about your past locations from your wireless provider, is that a search? If so, is it a search that requires the government to obtain a warrant? Courts have held that, because companies...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more