article thumbnail

First Pittsburgh “Under the Wire” CLE Seminar Features Presentation on E-Discovery “Hot Topics”

eDiscovery Law

At the inaugural seminar, Daniel Miller (a partner in our e-Discovery Analysis & Technology (“e-DAT”) […]. The CLE seminar was the first of a new series of in-person CLE events hosted at the K&L Gates Pittsburgh office.

article thumbnail

Assessing the Proportionality of Modern Data Types

eDiscovery Daily

On December 1, 2015, the rule was amended slightly to require that the scope of discovery be “proportional to the needs of the case.” [3] The parties’ access to relevant information – The need for a formal discovery is determined based on a party’s access (or lack thereof) to relevant information. 1] Patrick E.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Do’s and Don’ts of Text Message Discovery

eDiscovery Daily

Discovery requests of the past had little reason to include text messages as a form of evidence. 1] In 2015, research showed that 80% of professionals conducted business communications through texts. Unless subpoenaed, they may refuse to participate in discovery investigations. Text Message Spoliation Sanctions. 4] Anthony J.

article thumbnail

Increasing Your Technological Competence, Part 1

eDiscovery Daily

Initially assess e-discovery needs and issues, if any. In fear of the cost and rules of e-discovery, some lawyers try to avoid the practice altogether. During Rule 26(f) conferences, consult opposing counsel on the scope of discovery in relation to the costs of collection and production.

article thumbnail

iMessages Are No Longer Immutable: The Ability to Edit and Unsend iMessages Provided by Apple iOS 16 Spurs New E-Discovery Questions

eDiscovery Law

On September 16th, Apple released iOS 16, which now allows users to edit or unsend iMessages. A sender can edit an iMessage up to five times within fifteen minutes after the message is sent. A sender can also unsend an iMessage within two minutes after the message is sent. Recipients of such messages receive an […].

article thumbnail

Expert found 1,236 websites infected with Magecart e-skimmer

Security Affairs

A security researcher is warning of a new wave of MageCart attackers, he has found over 1,000 domains infected with e-skimmers. MageCart gangs continue to be very active, security researcher Max Kersten discovered 1,236 domains hosting e-skimmer software. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

Increasing Your Technological Competence, Part 2

eDiscovery Daily

Collaboration apps, forensic tools, and discovery software are just a few technologies that an attorney must juggle regularly. In 2015, the California Bar committee weighed in on the topic, providing a list of 9 skills needed for technological competence. As old technologies update and new ones emerge, will you adapt or fall behind?