eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Key Discovery Points: Timing is Mostly Everything in eDiscovery
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
How Attorneys’ Views on AI Are Impacting eDiscovery
Key Discovery Points: Get Your Objections In Early – and Keep Your Filings Succinct
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
Firma digital y firma electrónica, parecidas … pero diferentes
eDiscovery Needs Digital Forensics for a Mobile World
Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
A privilege log is the absolute bane of an attorney’s existence. I don’t mean it isn’t important and a critical component of discovery, but the level of planning, analysis and detail required to complete such a log is...more
In Orlando Health, Inc. v. HKS Architects, Inc., 2024 WL 4025379 (M.D. Fl. Sept. 3, 2024), the court denied an unopposed motion to enter a protective order and an unopposed motion to enter an ESI Protocol....more
This Sidley Update addresses the following recent developments and court decisions involving e-discovery issues: 1. an order from the U.S. District Court for the Eastern District of California granting a motion to compel...more
The Supreme Court recently adopted a proposed change to Rule 41 of the Federal Rules of Criminal Procedure that would allow a federal judge to issue warrants authorizing government agents to access computers located in any...more