Legal precedents set by past case law decisions remain one of the best ways to guide lawyers on how to do their job, especially when it relates to eDiscovery best practices. Case law examples help lawyers avoid mistakes made by others, as well as saving time and money for their clients. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2018 to enable lawyers to learn from these cases. Key topics include: + Is there a template for how parties should cooperate in a Technology Assisted document review? + Should a plaintiff be allowed to email all defendant employees to see if they have responsive documents? + Will fabrication of text messages result in sanctions post Rule 37(e)? + Can Twitter be compelled to produce direct messages between their own employees? + Can an individual be compelled to produce private Facebook photos by the opposing party? + How have proportionality considerations in the 2015 Federal rules affected scope of discovery? + Should a receiving party be granted a quick peek at privileged documents to resolve privilege disputes? + Should border searches of electronic devices require a warrant? + Can you be sanctioned for discovery violations even after a jury verdict? * MCLE Approved in Selected States Presentation Leader: Doug Austin Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.  Special Consultant to CloudNine: Tom O'Connor Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

Hora

19:00 - 20:00 hs GMT+1

Organizador

Simplifying Discovery: A View From The Cloud
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2025 351 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 26 de Junio de 2025
Mar 27 de Junio de 2025
Mié 28 de Junio de 2025
Jue 29 de Junio de 2025
Vie 30 de Junio de 2025
Sáb 31 de Junio de 2025
Dom 01 de Junio de 2025
Lun 02 de Junio de 2025
Mar 03 de Junio de 2025
Mié 04 de Junio de 2025
Jue 05 de Junio de 2025
Vie 06 de Junio de 2025
Sáb 07 de Junio de 2025
Dom 08 de Junio de 2025
Lun 09 de Junio de 2025
Mar 10 de Junio de 2025
Mié 11 de Junio de 2025
Jue 12 de Junio de 2025
Vie 13 de Junio de 2025
Sáb 14 de Junio de 2025
Dom 15 de Junio de 2025
Lun 16 de Junio de 2025
Mar 17 de Junio de 2025
Mié 18 de Junio de 2025
Jue 19 de Junio de 2025
Vie 20 de Junio de 2025
Sáb 21 de Junio de 2025
Dom 22 de Junio de 2025
Lun 23 de Junio de 2025
Mar 24 de Junio de 2025
Mié 25 de Junio de 2025
Jue 26 de Junio de 2025
Vie 27 de Junio de 2025
Sáb 28 de Junio de 2025
Dom 29 de Junio de 2025
Lun 30 de Junio de 2025
Mar 01 de Junio de 2025
Mié 02 de Junio de 2025
Jue 03 de Junio de 2025
Vie 04 de Junio de 2025
Sáb 05 de Junio de 2025
Dom 06 de Junio de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado