On Demand Webinars

  • March 23rd, 2022
  • Innovative Driven
Considerations for eDiscovery Experts and Neutrals

The complexities of eDiscovery may require parties to secure expert testimony to offer evidentiary support of eDiscovery-related motions or to […]

  • January 27th, 2022
  • Innovative Driven
Electronic Discovery 2021 Case Law Review

The case law on electronic discovery throughout the U.S. continues to evolve and proliferate. 2021 saw significant developments regarding any […]

  • December 20th, 2021
  • Innovative Driven
2021 eDiscovery Trends in Proportionality, Rule 34 Responses, and Sanctions

It has been six years now since rule makers enacted the last set of amendments to the Federal Rules of […]

  • November 12th, 2021
  • Innovative Driven
Ethical Considerations for Handling Document Reviews in eDiscovery

Reviewing documents in eDiscovery may seem as simple as a drive through the country. Nevertheless, the landscape is littered with […]

  • September 24th, 2021
  • Innovative Driven
Protecting Privilege and Work Product in the Age of eDiscovery

The attorney-client privilege and the work product doctrine provide counsel and clients with the necessary protection, confidentiality, and seclusion to […]

  • August 26th, 2021
  • Innovative Driven
Hot Topics in eDiscovery – 2021

2021 has already ushered in a number of eDiscovery developments that clients and counsel should be aware of. These developments […]

  • July 22nd, 2021
  • Innovative Driven
New Trends for Second Requests in the Biden Administration

In the first months of the Biden administration, a clearer picture is coming into focus of what the next few […]

  • June 25th, 2021
  • Innovative Driven
Defensible Preservation of Relevant ESI

Most lawyers know that relevant electronically stored information (ESI) must be preserved for litigation, but surprisingly few have implemented a […]

  • May 20th, 2021
  • Innovative Driven
Data Security For Lawyers

Organizations are increasingly under siege from a variety of cyber-threats ranging from malicious insiders and cyber criminals to lax internal […]