News & Analysis as of

Email Confidential Information Electronically Stored Information

Array

This Week in eDiscovery: The Cost of Securing Sensitive Data, Responding to Discovery Issues

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of August 19-25. Here’s what’s...more

EDRM - Electronic Discovery Reference Model

June’s Notable Cases and Events in E-Discovery

[Editor’s Note: This article was first published June 14, 2023 and EDRM is grateful to Robert Keeling, Chair of the EDRM Global Advisory Council and our Trusted Partner, Sidley, for permission to republish.] This Sidley...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

McGuireWoods LLP

Lawyers Beware: Seeking Hard-Copy Printouts of Privileged Emails Can Forfeit the Privilege

McGuireWoods LLP on

Many of us (especially the older generation) like to deal with hard-copy printouts of electronic communications. But inattention to the printout process can have disastrous results....more

Association of Certified E-Discovery...

[Webinar] Email Investigation Best Practices: What We’ve Learned From Recent FOIA Releases - July 23rd, 1:00 pm - 2:00 pm ET

The smoking gun isn’t a gun anymore; it’s an email, text or instant message. This interactive session will focus on strategies and best practices around email investigations illustrated with real documents obtained through...more

Ruder Ware

Employee Use of Company E-mail May be Protected from Company View

Ruder Ware on

Companies have always taken the position that an employee’s use of company e-mail is not private, and can be accessed and reviewed by the company at any time. There have been a large number of court cases, which have held...more

Cadwalader, Wickersham & Taft LLP

Law Firm Data Breaches Demonstrate the Expanding Scope of Cyber Attacks

In a case of “cyber meets securities fraud,” the United States Attorney’s Office for the Southern District of New York (“SDNY”) recently indicted three foreign nationals on charges of insider trading, wire fraud, and computer...more

Proskauer - Minding Your Business

Lawyers Beware: Sending Native File Documents to Third Parties May Violate Your Ethical Obligations

The rules governing discovery of electronically stored information, though not fully developed, have matured enough to provide the basic “do’s and don’ts” for attorneys. Frequently, a party must produce electronic documents,...more

McManis Faulkner

Best Practices: Keeping Corporate Communications Professional And Out Of The Courtroom

McManis Faulkner on

Corporate communications occur primarily electronically. It is important for companies to ensure these communications stay where they belong — within the company, not broadcast in a courtroom where a judge or jury can inject...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide