Unfortunately due to varying requirements among State by State CLE approval authorities for prerecorded material, we are not able to offer CLE credit for recorded webinars.  We can only offer CLE credit for the live sessions.

March 25, 2015

Wherever you go, there you are (with your mobile device)

The rise of Bring Your Own Device (“BYOD”) practices around the world and the differing legal standards for how to address them can lead to potential difficulties for the eDiscovery and Privacy professional.  Listed in 2014 by Law Technology News as the “number one e-discovery challenge for the coming years,” this new movement is likely to raise issues for your […]
January 21, 2015

Government Contractors: Guide to Preventing Security Leaks

The government relies on your company and employees to keep data secure. It is a daunting task. Even slight security failures could create real harm for your company. The headlines remind us that nations, cyber criminals, and rogue employees, are penetrating computer systems at an accelerating pace. Join us for the answers to 5 Key Questions: What steps should federal […]
December 10, 2014

2014 eDiscovery Caselaw Update: What’s new in eDiscovery

014 has been an interesting year for e-Discovery. Join us as we review caselaw highlights reflecting how courts continue to address new issues and new technologies.
October 15, 2014

Litigation Ready, Set, Go! -Creating Your Litigation Readiness Plan

How much will discovery cost your company?  Large cases frequently run into the millions of dollars, especially when companies are not prepared to respond efficiently.  Come and learn how to ensure your company is not caught off guard.  We will discuss how you can decrease discovery costs and the risks of sanctions by analyzing your data sources and structure, creating repeatable discovery processes, and creating protocols to actively manage your discovery costs.
August 5, 2014

The Real Value of Structured Data

The typical eDiscovery conversation is focused on the “vast universe of emails” that counsel wants to search or the “document that was intentionally deleted.” It’s too easily forgotten and often neglected, but there’s a wealth of information hidden within structured data sources that can be analyzed to tell yet an even more convincing story than that of an email thread.