Email retention just got harder thanks to functionality introduced by Google for personal Gmail and GSuite users. With a nod to apps like WhatsApp and Signal which allow chats to disappear, Google is allowing its users to send confidential emails that are protecting with a passcode and will be deleted after a set period of time (aka ephemeral messaging).
Our Blog
Thought Leadership and Industry Trends
How Are You Dealing with eDiscovery of Your Internet Content?
Discovery isn’t restricted to data found on file servers, laptops and phones anymore.
Gmail’s Auto-Updating Emails and What They Might Mean to eDiscovery Practitioners
Google recently announced that it would be adding a new feature to its Gmail offering that would automatically update emails stored in users’ mailboxes.
Beware eDiscovery Problems with Your Work-Related Apps
The good news for small and mid-size businesses (SMBs) is that there are a lot of free and inexpensive productivity and communication tools available to help them run their businesses.
When eDiscovery made the case for Taylor Swift
As this case makes clear, not only can’t you escape celebrities, you also can’t escape electronic evidence. It’s everywhere and affecting every case.
Bad eDiscovery practices are integral part of $18.5 million fee award
A recent antitrust/unfair trade practices case should send a clear message to litigants about the importance of proper eDiscovery to every part of a litigation.
Protective Orders Should Mandate Certified Cybersecurity Protections Over Discovery Data
In the litigation context, a Protective Order is a key tool that gives counsel and the court the power to control the protection of data that is going to be produced in response to discovery requests. That Protective Order should require all parties to protect data when it is held by counsel or by counsel’s vendors, and those protections should remain in place when the data is produced in discovery.
First Responders, Specialists, and Partners: Cybersecurity Collaboration at the Leaders in Law Forum
Effective cybersecurity must be collaborative in nature and this point was underscored by speakers throughout the program. This article lists some of the key messages from the forum that will help you get started collaborating with your colleagues on cybersecurity.
Sanctions for discovery misconduct: The latest from the US Supreme Court
In a rare discovery-related opinion, the US Supreme Court recently addressed how to calculate damages in the event of discovery misconduct. For litigants, the decision is a mix of good news and bad news as it reinforces the court’s inherent power to sanction bad faith behavior while limiting damages to those caused by the misconduct.
The Internet of Things: Amazon Echo and the Future of eDiscovery
In yet another case of the government seeking private information from a technology provider, Amazon spent the last month fighting a subpoena to hand over data in an Arkansas murder investigation…This matter, in combination with claims being made by the White House with regard to the Central Intelligence Agency’s use of “smart devices” has raised the profile of the Internet of Things as both a source of data and a method of data collection.
Securing data during eDiscovery collection for litigation
Cybersecurity is a huge concern for companies, but often there is not the same thought given to security of data during the eDiscovery collection process. There are many ways in which data can be lost or compromised during collection resulting in serious legal, financial and reputational consequences. Best practice for companies is to take the steps outlined in this article to ensure the physical and digital security of their data at every stage of collection.
The surprising advantages of nontargeted collection of electronic documents
Often, the inclination is to be targeted in collecting and preserving evidence to avoid the cost and time involved in large-scale collection. In many instances, a broad, nontargeted collection is the better method, offering several advantages.