Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Gone are the days when a lawyer would print out documents and prepare a privilege log by drafting individual descriptions — one privileged document at a time. Leveraging the latest technological tools, today’s e-data lawyers are as sophisticated and efficient in preparing privilege logs as they are in all other phases of discovery. Privilege-log planning should begin well before the first privileged document is logged. In fact, privilege-log strategy should be considered at the outset of a matter and included in early meet-and-confers with opposing counsel about the discovery process. In this article, we provide an overview of the different types of privilege logs; lay out best practices for negotiating ESI or privilege-log protocols; discuss what to do if an ESI or privilege-log protocol has not been entered in a matter; consider practical uses of technology to generate privilege logs; and address the inadvertent production of a privileged document.
Continue reading by getting
started with a subscription.
DOJ’s Cyber Fraud Initiative Is a Wake-Up Call That Keeps Ringing
By Randy S. Grossman, Kareem A. Salem and Kayla LaRosa
The DOJ's Cyber-Fraud Initiative’s results and DOJ’s guidance on corporate compliance have made the point to government contractors and corporate America — “now is the time to invest and reinvest” in cybersecurity compliance.
The Legal Help Desk: Shifting Toward User Sentiment as the Primary Health Factor
By Andrew Dober
Traditional metrics that once defined the effectiveness of help desk operations within law firms are undergoing a profound transformation. The new era places user sentiment and new delivery models at the forefront of service as a quicker “get back to work” mentality coupled with a technology-savvy generational shift. As a result, the gauges we use to measure customer satisfaction have changed and are shaping the overall future success of the legal tech support ecosystem.
The Perfect Storm: Why Contract Hiring Will Eclipse Direct Hiring In Privacy and Tech In 2024
By Jared Coseglia
Part Two of a Two Part Article
Part 1 of this article looked at how remote flexibility is driving job seekers, that most privacy programs will use contractors by 2026, the speed of hire, the real cost of DIY staffing and whether posting jobs online really works. Part 2 looks at what’s next for CPOs, AI jobs in privacy, where the new jobs will come from, whose salaries are spiking and some guidance for the latter half of 2024.
Six Reasons e-Discovery Benefits from AI
By Khaled Jebbari
Recent media coverage makes it clear that the time for law firms to embrace the disruption of AI is now. If you wait, from the looks of it, you risk losing business, and perhaps credibility.