eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
Key Discovery Points: Timing is Mostly Everything in eDiscovery
All in the Family: What’s Next for Cloud Attachments in eDiscovery?
Key Discovery Points: Even AI Experts Can Get Faked Out
Innovation in Second Requests: Data is Your Greatest Asset
Key Discovery Points: No Need to Be Leery About AI
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
How Attorneys’ Views on AI Are Impacting eDiscovery
Key Discovery Points: Get Your Objections In Early – and Keep Your Filings Succinct
Key Discovery Points: Lessons Learned from TikTok’s Redaction Fiasco
Firma digital y firma electrónica, parecidas … pero diferentes
eDiscovery Needs Digital Forensics for a Mobile World
Why Lawyers Can't Ignore eDiscovery
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
The AI Trust Test in eDiscovery
eDiscovery Tips: Helpful Questions to Ask Your Clients
30-Minute Workshop: Resume Clinic for EDiscovery Project Managers
Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more
In today’s digital world, the way we handle information has transformed dramatically. With this transformation, eDiscovery has become an essential part of legal proceedings and investigations. Whether you’re involved in a...more
For years, the EDRM has been seen as a stepwise, left-to-right process involving endless data movement and multiple tools. But what if you could revolutionize that approach? In this eye-opening session, discover how...more
One of the biggest challenges facing in-house legal teams is the ever-changing data landscape. The amount of structured and unstructured data has exploded over the last five years making legal and privacy activities more...more
In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more
Sensitive information is everywhere, from clients’ names and addresses to the trade secrets a business relies on to beat its competition. As such, organizations can’t avoid collecting, processing, storing, and transferring...more
In today’s world of dramatically increased remote work due to the pandemic, growing data privacy concerns with GDPR, CCPA and other data privacy legislation, increase in harassment claims with #metoo and rising corporate...more
Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more