Driven Inc

April 22, 2021
Mobile devices webinar thumbnail

Cloud Applications and Mobile Devices – Legal and Risk Management

The challenges associated with employee use of smartphones, tablets, and personal cloud applications such as Dropbox and Google Drive have been splashed across the headlines. Given the critical role of cloud and mobile functionality in business, few if any clients will likely ever be free from such challenges. However, there are steps that lawyers can take to help their clients either avoid or ameliorate the risks associated with these indispensable innovations. This program will discuss some of the key risks associated with mobile device and personal cloud use and spotlight best practices for addressing the issues.
April 1, 2021
Special Master consideration

Considerations for Using Special Masters in eDiscovery

Courts are turning with growing frequency to special masters as they confront increasingly complex eDiscovery scenarios. When properly selected and used in appropriate matters, special masters with eDiscovery expertise can help courts and parties prioritize issues for determination and streamline resolution of disputes in a cost-effective manner. This program provides an overview of the issues and examines key considerations surrounding the use of special masters for handling eDiscovery issues.
March 30, 2021
TAR workflow guide

Guide to Choosing a TAR Workflow

Lawyers should have a basic understanding of technology assisted review (TAR) so they can speak knowledgeably with clients and providers about whether to use TAR and, if so, which TAR workflow to use. In like manner, counsel must be able to communicate effectively with adversaries and the courts regarding the TAR process their clients have used.
February 26, 2021
Safeguarding the Attorney-Client Privilege in Discovery

Safeguarding the Attorney-Client Privilege in Discovery

The attorney-client privilege is one of the most important legal traditions in the United States. And yet, safeguarding privileged information has become particularly challenging given the massive amounts of electronic data now existing in most corporate electronic information systems. Given the sheer volume of potentially relevant information, it is often difficult to identify privileged communications and then withhold them from discovery.
X