Navigating the Maze: eDiscovery Essentials for Employers — Hiring to Firing Podcast
Harnessing the Power of eDiscovery: The Revolution of AI and Technology in Litigation and Investigations - The Consumer Finance Podcast
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Key Discovery Points: Timing is Mostly Everything in eDiscovery
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
How Attorneys’ Views on AI Are Impacting eDiscovery
Key Discovery Points: Get Your Objections In Early – and Keep Your Filings Succinct
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
Firma digital y firma electrónica, parecidas … pero diferentes
eDiscovery Needs Digital Forensics for a Mobile World
Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
In In Re: Uber Technologies, Inc. Passenger Sexual Assault Litigation, 2025 WL 678543 (Mar. 3, 2025), the court issued another hyperlinked document discovery decision arising out of the parties’ ESI Protocol. While...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of January 12-18. Here’s what’s...more
A recent decision from the Northern District of California, UAB “Planner5D” v. Meta Platforms, Inc. addresses a growing challenge in ediscovery: whether hyperlinked files embedded in emails and other documents are the same as...more
Editor’s Note: In a recent HaystackID webcast, legal professionals explored how HaystackID® Core Intelligence AI™ and its generative AI (GenAI) features can reshape electronically stored information (ESI) discovery. Moderated...more
The so-called “modern attachments” found in emails, collaboration software platforms like Slack and MS Teams, and other digital formats are presenting interesting and frustrating challenges for legal professionals in terms of...more
My esteemed colleagues, Kelly Twigger and Doug Austin, both posted about a recent discovery decision out of a federal district court in Florida, case no. 8:23-cv-102-MSS-SPF, styled, Byte Fed., Inc. v. Lux Vending LLC. and...more
[Editor’s Note: This article was first published June 18, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
In Re: Uber Technologies, Inc., Passenger Sexual Assault Litigation, 2024 WL 1772832 (N.D. Cal. Apr. 23, 2024), resolved a dispute over so-called “modern attachments” based on impressive and comprehensive technical...more
[EDRM Editor’s Note: The opinions and positions are those of Craig Ball. This article is republished with permission and was first published on April 8, 2024.] Last week, I dug into Cloud Attachments to email, probing the...more
It’s never too early in the year for eDiscovery case law! Our January 2024 monthly webinar of cases covered by the eDiscovery Today blog discusses Rule 45 subpoena requests, in-camera review and categorical privilege logs,...more
[Editor’s Note: This article was first published June 14, 2023 and EDRM is grateful to Robert Keeling, Chair of the EDRM Global Advisory Council and our Trusted Partner, Sidley, for permission to republish.] This Sidley...more
[Editor’s Note: This article was first published May 17, 2023 and EDRM is grateful to Robert Keeling, Chair of the EDRM Global Advisory Council and our Trusted Partner, Sidley, for permission to republish.] This Sidley Update...more
Identifying and logging potentially privileged documents has long been a pain point in document review. Expensive and time-consuming, ad hoc privilege workflows are the norm in most situations. That all changes with a new...more