With big data and the resulting explosion of electronic documents, texts, images and voicemails that are subject to discovery, the cost burden was increasing at a pace that required firms to reconsider their recovery approach. This is why in 2019, Mattern conducted its first deep dive into e-discovery and litigation support cost recovery in the 2020 e-Discovery and Litigation Support Cost Recovery Survey. Some of the results were surprising.
- April 01, 2020Nathan Curtis
Second and Eleventh Circuit rulings are likely to expand refuge to discovery in the U.S., even for international litigation and arbitrations that don't ordinarily include discovery rights.
April 01, 2020David R. Cohen and Bradley C. WhitecapHere are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.
March 01, 2020Mark SangsterIn their consideration of possible worst-case cyber attack scenarios, organizations often focus on the various types of attacks and their relative severity. But, the worst-case scenario is not the breach, it's the reputational damage, regulatory enforcement action, the business interruption, and the inevitable litigation that follows a poorly handled breach from an unprepared organization. Given this reality, it is important to adjust planning assumptions and response scenarios to focus on addressing these drivers of post-breach exposure.
March 01, 2020Michael Bahar, Sarah Paul, Matt Gatewood and Andrew WeinerWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.
March 01, 2020John ChenTechnology allows attorneys to keep informed so they can help their clients understand the potential impact on their company.
March 01, 2020Deb DobsonThe Pennsylvania Supreme Court enlivened the Thanksgiving holidays of privacy lawyers in 2018 with its decision in Dittman v. UPMC, which held that an employer has a legal duty to exercise reasonable care to safeguard employees' personal information. While the scope of the decision technically was confined to the employer-employee relationship, the court's reasoning implies that such a duty of reasonable care may arise in any scenario where one party engages in the collection of personal information.
March 01, 2020Devin ChwastykAdvanced Persistent Threat (APT) intrusions are sophisticated cyber-attacks carried out by well-funded and organized cyber-criminals. The attacks are designed to establish persistence using various tactics, techniques and procedures that are intended to avoid detection and mimic authorized activity in the environment, known as "living off the land."
March 01, 2020Chris Cwalina, Steven Roosa and Tristan CoughlinFlorida lawmakers have introduced companion bills in the Florida House (HB 963) and Senate (SB 1670) that would create limited online privacy rights and obligations in the state. The legislation appears to be very similar to the Nevada Online Privacy Protection Act, which was amended last year to add a right to opt-out of sales of covered information.
March 01, 2020David M. Stauss and Malia RogersCongress passed the Defend Trade Secrets with much fanfare, touting its potential to curtail both domestic and cross-border theft of American ingenuity and technology. The DTSA offers a unique and powerful remedy to aggrieved parties in their efforts to curb trade secret misappropriation: ex parte seizure of property containing trade secrets. This article provides a brief overview of DTSA seizure orders and discusses e-discovery considerations in connection with those orders.
March 01, 2020Philip Favro










