Why Your Data is Key to Reducing Risk and Increasing Efficiency During Investigations and Litigation
NFTs 101: The Basics of Non-Fungible Tokens, and Beyond
Sitting with the C-Suite: How eDiscovery is Colliding with Current Events
Sitting with the C-Suite: Empowering ESI Technology Investment with Metadata Analysis
In In Re: Uber Technologies, Inc. Passenger Sexual Assault Litigation, 2025 WL 678543 (Mar. 3, 2025), the court issued another hyperlinked document discovery decision arising out of the parties’ ESI Protocol. While...more
When it comes to discovery of mobile devices, it’s not just the data that’s important for discovery, but also the data about the data – the metadata – that can be used to authenticate evidence, to determine whether the data...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of May 6-12. Here’s what’s...more
Over 200,000 companies use Zendesk to drive better customer experiences. Featuring a fully integrated ticketing system and generative AI-powered bots, Zendesk helps businesses automate and strengthen their support efforts...more
Currently, no means of cross platform email duplicate identification exists. The EDRM Message Identification Hash (MIH) Specification takes a simple but effective approach to cross-platform email duplicate identification...more
You are invited to join EDRM’s Email Duplicate Identification Global Project Team as they share how they have solved the painful and oftentimes expensive process of duplicate identification across emails processed by multiple...more
By using our smartphones, tablets and computers, we create and exchange a vast amount of electronic data every day, but what some may not know is that there is a whole other world of information hidden beneath the surface —...more
Welcome to another installment of “E-Discovery Gold Nuggets”, where ACEDS Kansas City Chapter Leader Daniel Gold’s LinkedIn video series is explored on the ACEDS blog. Gold, who is also Managing Director of E-Discovery...more
Typical Google Vault exports provide limited metadata and data files that are not properly formatted for ediscovery needs. Incomplete information can be problematic for review platforms and result in wasted time and effort...more
Organizations that use Google Workspace in business know that any content could be responsive to litigation or necessary for an internal investigation. While Google Vault may be considered “good enough” at preserving and...more
At Hanzo, we’ve focused on collaboration tools for the last few years—and, as it turns out, we weren’t a moment too soon. The upsurge in remote work due to the coronavirus pandemic means that more workers than ever are...more
The March sessions of Legalweek took place recently, and as with the February sessions, the virtual event struck a chord that reverberated deep from within the heart of a (hopefully) receding pandemic. However, the...more
Trent Livingston has been the CEO of ESI Analyst since 2018. Trent started his career as a software test engineer and developer at Microsoft before entering the eDiscovery marketplace in the early 2000s. He has since provided...more
There are a lot of people in the legal-tech community talking about the discoverability of Zoom data these days, particularly as the move to a remote workforce continues in the wake of the COVID-19 pandemic. As far as...more
This week I saw a sticker in my vehicle that I hadn’t noticed before. It reads: “Vehicle Data Transmission is On! Your vehicle wirelessly transmits location, driving and vehicle health data to deliver your services and for...more
The submission of digital evidence traditionally required a sponsoring witness—something that could be time-consuming and expensive. Thankfully, as more and more online content, such as social media posts and chats, play a...more
Technology competence is an ethical requirement in more than 40 states. Beyond Rule 1 Competence, knowing technology helps lawyers comply with the duty of confidentiality and other rules of professional conduct. For...more
In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In this article, we turn to the types of information you can expect to encounter with mobile devices and key considerations...more