March 20, 2023 | Legaltech News
New Cases Spotlight Best Practices for Handling Ephemeral Messages in LitigationEphemeral messaging applications continue to pose challenges for companies and their employees.
By Philip Favro, Innovative Driven
7 minute read
July 25, 2022 | Legaltech News
New Sanctions Case Offers Lessons on ESI Protocols and Information Governance PoliciesAs reflected in the recent In re Keurig Green Mountain Single-Serve Coffee Antitrust Litigation case, noncompliance with preservation provisions in an ESI protocol can expose parties to severe sanctions under Federal Rule of Civil Procedure 37(b)(2)(A).
By Philip Favro, Innovative Driven
6 minute read
May 18, 2022 | Legaltech News
New Cases Spotlight E-discovery Trends on Possession, Custody or Control and Jury Instructions re: ESI SpoliationTwo particularly noteworthy topics in recent e-discovery litigation include: possession, custody, or control questions involving employee text messages; and the role and form of adverse inference instructions to juries to address ESI spoliation.
By Philip Favro, Innovative Driven
5 minute read
February 17, 2022 | Legaltech News
Court Sanctions Plaintiff for Destroying Relevant Facebook Messenger and Telegram MessagesJudge David Campbell, who led the Federal Civil Rules Advisory Committee that developed the Rule 37(e) amendments enacted in 2015, issued an adverse inference jury instruction against plaintiff after finding she spoliated relevant Facebook Messenger and Telegram messages and other ESI.
By Philip Favro, Innovative Driven
7 minute read
January 27, 2022 | Legaltech News
Court Rejects Sanctions Based on Party's Efforts to Remediate Data LossMedidata Solutions v. Veeva Systems offers key lessons regarding the need for effective preservation measures in connection with an organization's litigation readiness.
By Philip Favro, Innovative Driven
6 minute read
December 02, 2021 | Legaltech News
What Litigants Should Know About New Court Decisions on Categorical Privilege LogsCourts have issued several recent opinions that provide guidance for how parties should handle the development of privilege log alternatives like metadata logs, categorical logs, and logs reflecting samples of privileged documents.
By Philip Favro, Innovative Driven
5 minute read
Trending Stories