The JustPod: A murder-for-hire allegation, public corruption trial, and notable acquittal
Bar Exam Toolbox Podcast Episode 309: Listen and Learn -- Felony Murder and Causation (Criminal Law)
Key Discovery Points: If You Dispose of Relevant Hard Drives You Will Face (Some) Consequences
Key Discovery Point: Collecting Hyperlinked File Versions – Contemporaneous or “As Sent”?
Podcast - The 3 Core Themes of Trial Law: Do the Right Thing
Aligning Business Goals with Legal Strategies Amid Regulatory Change – Speaking of Litigation Video Podcast
House Final Settlement Hearing: Key Insights and Future Implications for NIL — Highway to NIL Podcast
The 3 Core Themes of Trial Law: Tell Your Story
What Were the Cooler Wars? (Part 2) — No Infringement Intended Podcast
eDiscovery Case Law Podcast: How Failing to Meet and Confer Effectively Can Lead to Sanctions
The JustPod: Lawyer, Gentleman, and Counsel to the Stars: A Discussion with Brian McMonagle
The Subpoena Playbook
Podcast - The 3 Core Themes of Trial Law: Know Your Court
Podcast - Real Justice for Real People
The Briefing: Diana Copeland – “Surviving R. Kelly” But Not Netflix’s Motion to Dismiss
(Podcast) The Briefing: Diana Copeland – “Surviving R. Kelly” But Not Netflix’s Motion to Dismiss
Key Discovery Points: Timing is Mostly Everything in eDiscovery
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
There Is No Right Path
Despite the many technological advances in the collection, processing, and review of electronically stored information, it remains vital to conduct custodial interviews focused on data identification to confer a litigation...more
Modern attachments, in Google Workspaces and Microsoft Office, have long posed significant challenges in eDiscovery. They are not actual files attached to an email or message but are links pointing to files stored elsewhere....more
Join Greg Sullivan and Matt Maslow from Deloitte, as they showcase how they have harnessed Generative AI to overcome some of the most persistent challenges in eDiscovery review. Drawing from their experience building a custom...more
Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more
Remote, in-office, or hybrid — Slack has become an indispensable tool for companies looking to support productivity, no matter where it happens. Think of Slack as a digital headquarters for businesses, relied on daily by...more
The saying “the early bird gets the worm” emphasizes the importance of starting something early to maximize potential outcomes. In the context of “modern attachments,” legal teams, IT professionals, and eDiscovery...more
Apple recently announced it will be releasing its new mobile operating system, iOS 16, on September 12. The update will be available to iPhone 8 devices and newer. Although the new operating system will include some of the...more
Editor’s Note: On September 15, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more
The concept of early case assessment (ECA) hasn’t changed with the times — the name of the game is still getting a clear, upfront picture of the issue at hand, as well as any liabilities or potential costs. But what has...more
One of the easiest ways a law firm can look to innovate is in the area of eDiscovery and document management. As data levels grow exponentially, centralising and automating data management/analysis within disputes,...more
Ipro Announces Ipro Tech Show Will Take Place at ASU College of Law in 2020 - Ipro Tech, LLC, a global leader in eDiscovery and Trial software technology, is pleased to announce the Ipro Tech Show, which will happen March...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more
Be careful what you post on the Internet. Not everyone listens to this warning, and those who ignore it could see their posts, tweets, shares, and likes front and center — in court....more