Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

<i>Legal Tech:</i> Peril in Paper: <i>EEOC v. GMRI</i> and the Digital Divide in e-Discovery Sanctions Image

<i>Legal Tech:</i> Peril in Paper: <i>EEOC v. GMRI</i> and the Digital Divide in e-Discovery Sanctions

David Horrigan

There was a time not so long ago when the term “e-discovery” didn't exist. It was known simply by its legal name, discovery. We're now entering an era where some observers feel the term will fade into history, returning us back to simply calling it discovery.

Features

Top Cybersecurity Takeaways from Relativity Fest 2017 Image

Top Cybersecurity Takeaways from Relativity Fest 2017

April Runft

Cybersecurity is a hydra of complexity. Keeping a grasp on it requires constant re-education. What no one tells you: managing your company's cyber vulnerability demands a willingness for personal vulnerability. Being honest about our cyber risks is painful. And scary.

Features

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions Image

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions

Mike Hamilton

In today's political climate, it has almost become "normal" that people frivolously make speculative statements without any proof that the statement is true. While this may be standard practice in the political world, in court this practice will not be convincing to any judge, especially when making an argument for e-discovery sanctions based on new rule FRCP 37(e).

Features

<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles Image

<i>Legal Tech</i><br>Sedona Conference Releases Finalized Third Edition of the Sedona Principles

Zach Warren

<b><i>The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age</b></i><p>Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.

Features

New Sources of Discoverable Evidence Image

New Sources of Discoverable Evidence

Michael Ciaramitaro

<b><i>Part Two of a Two-Part Article</i></b><p>Last month, the author discussed some of the technologies people are using today, such as fitness trackers and intelligent personal assistants, and the e-discovery implications they entail. Like these, automotive "Black Boxes" and drones could yield important information for those seeking evidence in a legal action.

Features

Selling the Value of Litigation Support Image

Selling the Value of Litigation Support

Stephen Cole

When it comes to practicing litigation, the use of technology is no longer optional. What is optional, however, is under which business model firms deliver this service to their clients, and how to determine which model balances the most value — to the client and the firm.

Features

<i><b>Legal Tech</i></b><br> Four Cases Highlighting e-Discovery Trends in the First Half of 2017 Image

<i><b>Legal Tech</i></b><br> Four Cases Highlighting e-Discovery Trends in the First Half of 2017

Mike Hamilton

A look at important cases in e-discovery so far this year.

Features

<b><i>Legal Tech</b></i><br> Taking e-Discovery to the Cloud Is the Smart Security Solution Image

<b><i>Legal Tech</b></i><br> Taking e-Discovery to the Cloud Is the Smart Security Solution

Perry Marchant & Bill Lederer

The cloud might seem like “someone else's servers,” but major vendors are sensitive to the business need for security, availability and confidentiality. With sensitive, high-value data like that, cloud providers are keenly aware they need to get security right.

Features

Are Your Post-Breach Forensic Reports Privileged? Image

Are Your Post-Breach Forensic Reports Privileged?

Brian E. Ray

<b><i>A Trend Is Emerging</b></i><p>The Central District of California recently joined the small growing list of courts that have held forensic reports created by outside security companies following a data breach are protected from disclosure in civil litigation in certain circumstances.

Features

<i><b>Legal Tech</b></i><br> Five Ways Legal and Compliance Teams Can Benefit from Office 365 Migration Image

<i><b>Legal Tech</b></i><br> Five Ways Legal and Compliance Teams Can Benefit from Office 365 Migration

Jake Frazier & Chris Zohlen

Legal and compliance groups have a lot to gain from features within Office 365, and equal or greater risk if the process is not conducted in the context of strong legal and regulatory guidelines.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES