Episode 5: Business Divorce, Delaware Style
Afraid you won’t be up to date on important case law? Our October 2024 monthly webinar of cases covered by the eDiscovery Today blog will remove all your fears! During the webinar we will discuss disputes related to relevance...more
Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information. This...more
Safeguarding against evidence spoliation ahead of litigations, audits, or investigations is a lot easier when you have a timely, defensible legal hold process. In this conversation, take a look at how to achieve this by...more
Join us for a transformative webinar, "Legal Hold Made Easy: Building a Defensible Litigation Workflow," where we'll unravel the power of automated legal hold software to simplify and strengthen your litigation process. ...more
We’re ready to “spring” into new eDiscovery case law disputes! Our April 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a dispute over search terms and custodians for a...more
Tracking and maintaining a high custodian acceptance rate is imperative to the defensibility of your ediscovery process. For lean or otherwise bandwidth-strapped legal teams, chasing down custodians can quickly become...more
Our May monthly webinar of cases covered by the eDiscovery Today blog discusses disputes including third-party subpoena jurisdictional disputes, disputes over forensic imaging, the use of file “shredder” software and...more
95% of all corporate investigations include message and conversation data as key evidence. When gathering this crucial data from employees’ mobile phones, are you having to ship equipment or struggling with lengthy support...more
Tracking and maintaining a high custodian acceptance rate is imperative to the defensibility of your ediscovery process. For lean or other bandwidth-strapped legal teams, chasing down custodians can quickly become...more
The proliferation of short messages falling into the scope of discovery or disclosure is unabated. These can be mobile SMS texts or instant messages from popular applications such as WhatsApp, Viber, Slack, Skype and MS...more
One of the misconceptions that many people have about the EDRM model is that it represents only a linear flow for the order of discovery processes. People think that because the diagram seems to indicate an orderly flow to...more
What makes a great legal hold notification? We all know that legal holds are essential for ensuring evidence is preserved. But how do you get custodians to acknowledge legal holds the first time, not the tenth? And what would...more
ACEDS partners with Mandi Ross and Prism Litigation Technology to present an informational webinar that will present a new discovery workflow that operationalizes proportionality, provides defensible and transparent metrics...more