loading please wait..

Blog

Articles about legal technology, legal operations, e-discovery and other related matters of interest.

Litigation Hold Triggers and the Duty to Preserve Evidence

Implementing a legal hold to preserve relevant information is required upon a credible threat of litigation and preservation efforts must be reasonable.

Read More →

E-Discovery Ethical Conundrums (In-House Counsel Edition)

A look at a few rules of professional conduct that might apply when in-house counsel must deal with e-discovery projects.

Read More →

6 Things We Learned About Legal Tech & E-Discovery in 2016

Six developments in legal technology and e-discovery law from 2016.

Read More →

California Legal Ethics Update: State Bar Opinion on Attorney Blogging

Is attorney blogging a “communication” subject to rules regulating attorney advertising? The State Bar of California weighs in.

Read More →

IL Case Law Update: Inspection of Litigant’s Hard Drive and Discovery Proportionality

An Illinois court offers guidance on when it is appropriate for a litigant to search an adversary's computer and weighs in on e-discovery proportionality.

Read More →

E-Discovery Cooperation- Some Suggested Areas of Agreement

This article explains why cooperation is an important e-discovery concept and also provides some real-world suggestions about areas of cooperation.

Read More →

Do I Have to Agree to E-Discovery Search Terms?

E-discovery is a cooperative party-driven process. Agreement on search terms and methods is important. But, that does not mean you get everything you want.

Read More →

15 Issues to Consider for E-Discovery and ESI Protocols

For those unfamiliar with e-discovery and ESI, negotiating an ESI protocol may seem daunting. However, nearly every protocol covers the same topics.

Read More →

Do Email Messages Have to Be Produced With Attachments in Litigation?

There is no hard and fast rule. But, there are a few legal arguments to support producing email messages with attachments.

Read More →

Are Employees Required to Disclose Passwords or Encryption Keys During Government Investigations?

Employees could be compelled to provide passwords to corporate data sought by a government investigation, but the Fifth Amendment might apply.

Read More →