Date: May 6, 2015 Time: 1 PM – 2 PM EST

Bust These 4 Myths on Your Next Document Review

Conducting an effective and efficient legal document review requires a hybrid of rocket science, brain chemistry and hot coffee. With ediscovery technology and best practices constantly evolving, if your document review practices haven’t changed in recent years, you are likely wasting time and money for your organization and/or your client…

Courtesy of: Kroll Ontrack


Date: May 13, 2015 Time: 1 PM – 2 PM EST

Social Media – The Next Wave Of Digital Evidence for Organizations

According to Nielsen, internet users continue to spend more time with social media sites than any other type of site. The total time spent on social media in the U.S. across PC and mobile devices increased by 37 percent to 121 billion minutes in July 2012 compared to 88 billion minutes in July 2011. In February 2014, Nielsen stated that 47% of smartphone owners visited social networks on a daily basis last year…

Courtesy of: Digital Mountain


Date: May 15, 2015 Time: 1 PM – 2 PM EST

Cut Costs and Time Associated With Legal Holds and Data Review

Many organizations still employ the “email and Excel” method of implementing litigation holds, without realizing how much this may be costing them in wages and lost productivity. Furthermore, this method presents process defensibility risks because courts are increasingly sanctioning parties for less-than-reasonable efforts to assure hold compliance…

This is a Members-Only Webinar. If you are not already a member and would like to join ACEDS, click here or you can purchase this webinar for only $35.


Date: May 20, 2015 Time: 1 PM – 2 PM EST

How Analytics Can Deliver Insights in eDiscovery

McGuireWoods has a very specific workflow for handling ESI
using Advanced Discovery’s services in conjunction with Relativity. This workflow encompasses several eDiscovery stages including Collection, Ingestion into the Advanced Discovery ECA tool, Deployment of Search Terms, Promotion into Relativity, Analytics with Clustering, Categorization, Review…

Courtesy of: Advanced Discovery


Date: May 20, 2015 Time: 1 PM – 2 PM EST

The Interplay between Transparency, Cooperation, and Disclosure in Predictive Coding

One of the thorniest eDiscovery issues confronting counsel involves the level of transparency and cooperation required when using predictive coding. Courts have given inconsistent guidance on this issue, leading to confusion as to whether and what to disclose to a litigation adversary regarding the use of predictive coding. However, U.S. Magistrate Judge Andrew Peck’s recent opinion in Rio Tinto v. Vale sheds further light on the nature and extent of transparency required, as well as highlighting differences in specific TAR methodologies. Come listen to a panel of experts discuss the issues and provide insights on a particularly compelling discovery practice area.

Courtesy of: Recommind


Date: May 29, 2015 Time: 1 PM – 2 PM EST

Bottom-Line E-Discovery: How to Develop Metrics to Track Costs and Measure Effectiveness

Corporate e-discovery spend can vary wildly, and depends on matter type, the number of custodians involved, the information at issue, deadlines and many other factors. Achieving cost predictability is a challenge, but organizations that track, analyze and put to use data…

Courtesy of: ACEDS


Date: June 8, 2015 Time: 1 PM – 2 PM EST

Global Implications on e-Discovery, Litigation & Regulatory Compliance

As attorneys and legal professionals, it is prudent – if not necessary – to take every effort to vet organizational, law firm and vendor data security policies and make sure they are being proactive—before it is too late. Asking intelligent questions of the organizations, law firms and service providers you work with can save money and help your organization avoid being the next victim of a large-scale, highly publicized data breach…

Courtesy of: Kroll Ontrack


Date: June 12, 2015 Time: 1 PM – 2 PM EST

Cyber-Bullseyes: Why Law Firms Are Susceptible To Data Breach — And What To Do About It

When it comes to defending against cybercrime, not all organizations are created equally. Law firms may be especially susceptible to data breach, and, at least anecdotally, are increasingly the target of nefarious outside actors. In this ACEDS webcast, attorneys at the New York firm Patterson Belknap Webb & Tyler explain why hackers…

Courtesy of: Patterson Belknap Webb & Tyler Law Firm


These webinars will be recorded and available to everyone for 3 days following the live event on our On-Demand Training page.  Please sign up above even if you only plan to watch the recording.  You will be notified once the recording is posted.  After the initial 3 days, they will be available to ACEDS Members only. To get access to all on-demand training, join ACEDS today! Missed the live version? Contact 786-517-2725 for more information about our web seminars.