Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
NFTs 101: The Basics of Non-Fungible Tokens, and Beyond
Sitting with the C-Suite: How eDiscovery is Colliding with Current Events
Sitting with the C-Suite: Empowering ESI Technology Investment with Metadata Analysis
A privilege log is a critical component of the discovery process,. It provides a line-by-line account of confidential communications, documents, and other materials that have been withheld or partially redacted due to claims...more
In In Re: Uber Technologies, Inc. Passenger Sexual Assault Litigation, 2025 WL 678543 (Mar. 3, 2025), the court issued another hyperlinked document discovery decision arising out of the parties’ ESI Protocol. While...more
Effective management of discovery disputes is critical in litigation, particularly as courts enforce stricter adherence to discovery deadlines. A recent decision in Valeo Schalter und Sensoren GmbH v. NVIDIA Corp. highlights...more
Read these ediscovery collection best practices to learn why self-collection – or allowing clients to collect their own data – is dangerous. Picture this: it’s 1988 and you’re at your desk, poring over a veritable...more
TRIAL PREPARATION SERIES / PART THREE OF THREE - A looming trial or hearing date is no reason to panic. As we have described in PART 1 and PART 2 of our blog series, if your trial team has kept a well-organized and...more