Privilege not waived for material obtained from seized computer bought at public auction if proper precautions were taken

In Kyko Global Inc. v. Prithvi Info. Solutions Ltd., the court addressed the question of whether defendants waived their attorney-client privilege following the sale of a seized computer at public auction. Kyko Global Inc. v. Prithvi Info. Solutions Ltd., No. C13-1034 MJP, 2014 WL 2694236 (W.D. Wash. June 13, 2014) Under Washington law, the court […]

Major changes in NY privilege log practice should save time and money

In this age where e-discovery increased the cost of litigating, New York’s Commercial Division will benefit from Rule 11-b, otherwise known as the revised privilege log practice, starting from September 2, 2014. According to the order issued on July 8, 2014, Rule 11-b will require parties to meet before and throughout litigation to discuss the […]

In Re Matter of a Warrant, F.Supp. (S.D.N.Y. 2014)

On April 25, 2014 James Francis, Magistrate Judge of the Southern District of New York, held that all U.S.-based Internet, email, and on-line storage providers can be forced to hand over overseas data, if so requested by a U.S. government search warrant. The case itself addressed a search warrant issued to Microsoft for a customer’s […]

Technology and Ethics (“Technethics”) – 2013 in Review – Part One

Originally published as Ethics Watch: Technology and Ethics (“Technethics”): 2013 in Review, South Carolina Lawyer 14 (March 2014) In past years I have written a year-in-review Ethics Watch column, covering significant South Carolina ethics decisions and opinions, along with ABA Formal Opinions issued during the year. Because technology is playing an increasingly important role in the […]

Allyson Haynes Stuart, One Massive Litigation Hold Order in California NSA Cases

Lawyers are familiar with the “litigation hold” – once litigation is reasonably anticipated, potentially relevant documents, including electronic documents, must be retained and not destroyed.  Ordinarily the scope of that data extends to the specific parties and the locations their relevant data may be found (laptops, cell phones, etc.).  But when the litigation involves the […]