E-Discovery

 
 
  • Privilege Caution When In-House Attorney Is 30(b)(6) Witness

    In the Northern District of Illinois, a court ruled that a company must produce privileged documents that an in-house attorney used to refresh her memory prior to being deposed as a 30(b)(6) witness. The key here was...

    • Posted 2 weeks ago
    • 0
  • Have Algorithms Gotten A Bad Rap?

    Sendhil Mullainathan, a professor of behavioral and computational science at the University of Chicago, is the co-author of two studies that document the extent to which racial bias influences institutional decision-making. In one study, pairs of resumes...

    • Posted 1 month ago
    • 0
  • Managing Mountains of Data: Q&A with H5

    Identifying and retaining data that has business value is critical, but that same data can pose risks. Today’s General Counsel interviewed Sheila Mackay and Karla Wehbe of the technology services firm H5 on how to manage these...

    • Posted 1 month ago
    • 0
  • Years of ADA Shakedowns Alleged, And A Law Firm Settles

    A Silicon Valley law firm has settled a lawsuit alleging that it was shaking down small businesses by filing lawsuits for minor and in some cases bogus ADA violations and then extracting settlements.

    • Posted 1 month ago
    • 0
  • Negotiating Second Request Discovery

    A Hart Scott Rodino Second Request can be a major impediment to the completion of an M&A deal, and compliance can be a challenge. It requires an organization to process, review and then produce large quantities of...

    • Posted 2 months ago
    • 0
  • Cybersecurity Protocols and ADR

    Surveys taken after the massive Panama Papers hack suggested that law firm cybersecurity industry-wide was lagging behind health care and financial services companies. Now it appears that another niche of the legal industry may be even less...

    • Posted 2 months ago
    • 0
  • Ransom Attack Hits A Case-Management Provider; Client Law Firms Feel The Pinch

    One of the nation’s largest case-management firms has been targeted by a ransomware attack. Early in October, it alerted customers regarding what it first characterized as a security breach caused by a.....

    • Posted 3 months ago
    • 0
  • Negotiating Second Request Discovery

    Few things can incite more urgency for legal and compliance teams than a Hart Scott Rodino Second Request. Notorious for their tight deadlines and high stakes, second requests require organizations to process, review and produce large quantities...

    • Posted 4 months ago
    • 0
  • In-House Counsel, PR Consultants And The Privilege

    Formerly PR, and PR crises in particular, were handled internally and with extensive involvement of the legal department. Today the handling of PR crises is often outsourced, and crisis management is a recognized specialty industry. “Unfortunately,” writes...

    • Posted 4 months ago
    • 0
  • Re-Purposing E-Discovery Software To Field DSARs

    Among the provisions of the California Consumer Privacy Act will be a requirement for affected companies to respond to a Data Subject Access Request. The “subject” of a Data Subject Access Request could be any consumer who...

    • Posted 4 months ago
    • 0
Do NOT follow this link or you will be banned from the site!