E-Discovery for IoT Devices: Primer for Representing Individual Clients

How can IoT data impact your individual clients in federal court litigation? The Federal Rules of Civil Procedure provide some guideposts, but much is uncertain given the relatively new introduction of many IoT products and the rapidly developing feature sets.

Defensible Deletion: The Proof Is in the Planning

This article provides a framework for making defensible deletion an attainable goal. If the process has been well-planned, executed, and documented, the risk of sanctions for inadvertent spoliation of evidence is slight.

The Pandemic Swamped Your Information Governance Plan. This Is How To Right the Ship.

Making it your New Year’s resolution to impose order on the lurking chaos of remote, decentralized data environments will pay dividends in productivity, business continuity and legal risk.

Cross-Border Cyber Review: It’s Not Your Typical E-Discovery Exercise

While there are tools, tricks, and processes that can be lifted from classic e-discovery processes, a cyber review is distinct with its own unique workflow.

Building a Better ESI Agreement: Why Customization Matters

There are a wide range of potential challenges that arise when negotiating an ESI agreement, but here the authors examine some of the more common issues encountered and provide practical tips to help address these considerations.


NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.