ACEDS Blog

The eDiscovery Voice is a platform for the ACEDS and greater ediscovery community to educate each other, shine the light on new ideas and people, and advance the practice and careers of its authors and readers.

Get updates when new blog articles are posted by subscribing to our emails.

Locked chain on laptop as computer protection and cyber safety concept. Private data protection from hacker malware

DSARs 101: What to Expect When Doing Business with EU Customers

For any organization that deals with privacy issues in the European…
Block chain network/Blockchain network concept , Distributed register technology , Block chain text and computer connection with blue background

The Increasing Promise of Technology-Assisted Review: How to Tame the Vulgar Expense of E-Discovery

In my first major case using technology-assisted review, our…
Justice and Law concept image

Sean O’Shea: Tips for Paralegals and Litigation Support Professionals – May 2020

5/1/2020: (California Styling) The California style is distinguished…
Macro photo of tooth wheel mechanism with PROJECT concept related words imprinted on metal surface

Paralegals Are Project Managers Too!

I wrote this piece a few years ago for my own personal blog because…
Old Coins

A Matter of Pricing? A Running Update of Semi-Annual eDiscovery Pricing Survey Responses

The Semi-Annual eDiscovery Pricing Survey Based on the complexity…
Palm Trees

Encryption's Impact on Potential Liability Under CCPA

(This article is brought to you courtesy of the International…

A Pandemeconomic Indicator? Summer 2020 eDiscovery Pricing Survey Results

Editor's Note: According to the International Monetary Fund,…
Cellebrite ACEDS Partnership

ACEDS Partners with Cellebrite

May 19, 2020– EAGAN, Minn. – The Association of Certified…
Apple iphone pro on laptop keyboard

Apple iPhone Forensics: An Update from the Trenches

Since the first-generation iPhone model released in 2007, thirteen…