August 18, 2023

Why Effective Legal Ops Management Makes Business Sense and Frees Up Lawyers to Practice Law

“You can have the best tool in the world, but if nobody’s using it, it’s a failure.”   That’s just one of many insights from UpLevel […]
July 9, 2023

Why Legal Teams Should be Agile Like Foxes and Not Defensive Like Hedgehogs

Richard Jolly of Northwestern University – Kellogg School of Management explains that many in the legal industry are likely hedgehogs. They are subject matter experts with deep expertise in one area, but in a rapidly changing world, the ability to adapt like a fox is increasingly important.
April 22, 2023

You Subpoenaed My Documents, Shouldn’t You Pay for Them?

Companies responding to federal subpoenas are responsible for costs unless the costs are "significant" and generally cannot charge for data requests under privacy laws.
March 10, 2022

What is ECA (Early Case Assessment) and Why is it Important?

Early case assessment (ECA) provides an opportunity to understand evidence and also presents opportunities for fact finding and cost savings.
October 5, 2021

Cyber Security Best Practices for Legal

In the latest episode of the Technically Legal Podcast, Matthew Holland, CEO of Field Effect, explains why law firms & legal departments are hacker targets and talks cyber security best practices.
August 31, 2021

Do Email Messages Have to Be Produced With Attachments in Litigation?

There is no hard and fast rule. But, there are a few legal arguments to support producing email messages with attachments.
August 26, 2021

When Must Litigant Provide Computer to Opponent for Examination?

Compelling a forensic examination of a computer hard drive generally requires a showing of discovery misconduct by the device owner.
August 18, 2021

The Sedona Conference Weighs in on Ephemeral Messaging

The Sedona Conference examines legal and regulatory issues presented by ephemeral messaging, the benefits and risks of using the messaging apps, and offers a policy framework for both businesses and courts.
August 1, 2021

What is a Computer File’s Hash Value?

ESI and electronic files have a "hash value" (a string of alphanumeric characters) used to identify duplicates and confirm authenticity.