
Blog Articles
← Back to Blog
Search
Authors
My Father is a Lawyer – Are My Emails With Him Privileged?
A federal court ruled that emails between a woman and her father, a litigator, were not protected by attorney-client privilege. The decision highlights that a familial relationship alone doesn’t establish privilege without clear legal intent,...
Cloud Utility Pricing: Transforming Discovery Economics Through Consumption-Based Pricing
Cloud Utility Pricing is reshaping discovery economics by replacing flat-rate hosting with a use-based model. Legal teams gain cost control, better security, and flexible access, paying less when platforms are idle and more only when...
Challenges to Redacted Metadata Privilege Log
A court ruled on a challenge to a metadata privilege log, allowing some redactions but requiring detailed descriptions for redacted entries and email attachments.
Inside the Salesloft Drift Breach: Critical Lessons for SaaS Security and Governance
The Salesloft Drift breach compromised 700+ organizations via OAuth token abuse. This deep-dive unpacks what went wrong and what must change in SaaS security, governance, and eDiscovery practices.
Listing a Document on a Privilege Log Concedes That it is Relevant for Discovery
The court in Lively v. Skyline confirmed that including materials on a privilege log concedes their relevance for discovery, reinforcing Rule 26’s implications for privilege assertions.
Weekly Letter to Our EDRM Global Community – 16 September 2025
This week’s EDRM community update features recent blog posts, upcoming webinars, notable podcasts, and key announcements. Stay engaged with the EDRM community for the latest insights and support.
What is a “Document?”: Interior Email Omitted from Email Chain – Sanctions Follow for Lack of Candor to Court
In Golat II, the court sanctioned counsel for omitting a key email in a discovery dispute, spotlighting the duty of candor and redefining what qualifies as a “document” in ESI.
Dealmaking with Discipline: An HSR Read on FY2025’s Final Stretch
With 1,902 HSR filings through August FY2025, U.S. dealmaking reflects precision over pace. Data readiness, cybersecurity, and eDiscovery preparedness are emerging as key drivers of transaction success amid regulatory complexity.
Discovery of Search Terms & Ephemeral Signal Messages – It Has Not Yet Ended “With Us”
The Lively v. Wayfarer Studios case continues to raise key eDiscovery issues, with the latest ruling mandating production of Signal messages and search terms, while dismissing reciprocal demands as unfounded.
No Duty to Produce Documents That Requestor Already Has
In Rutherford v. Central Bank of Kansas City, the court ruled that a party need not reproduce discovery already in opposing counsel’s possession. However, it required a gap analysis to determine what unique materials remained...
HaystackID® Marks Fifth Consecutive Year of SOC 2 Type 2 Certification with Continuous Assurance Model
HaystackID has achieved its fifth consecutive SOC 2 Type 2 certification, reinforcing its commitment to real-time, independently validated security for legal and regulatory data environments.
Geofencing, Geotargeting, and Geo-blocking, in Civil Litigation, Information Governance, and Regulation
Geofencing and its digital cousins are increasingly showing up in civil litigation and regulatory discussions. From jury influence to healthcare privacy, this post flags the key issues.