E-Discovery Data Challenges in Environmental Litigation

16 Jun , 2022

To register for the upcoming live webinar, please Click Here

When dealing with natural resource damages caused by contaminants released into the air, ground and/or water, litigation occurs. This litigation triggers a host of complex, yet common e-discovery data and analytical problems that can stress and burden both the e-discovery team and the litigation support system you are working with. 

In this CLE, attendees will hear from experts who worked on MTBE and other environmental litigations. They will learn about the data problems that commonly arise from natural resource damage litigation and how attorneys dealing with these challenges should respond.

 

To register for the upcoming live webinar, please Click Here

More Webcasts

Silence in Court! Mo...

“Movement psychology” is a branch of psychology that emerged in the early twentieth cent...

Navigating the Ever-...

How did E. Jean Carroll successfully bring a sexual assault lawsuit against Donald J. Trump when the...

2024 Mid-Year Insura...

This CLE presentation will empower attendees to: • Identify common issues and claims that pres...

Mental Health and Th...

In the last 20 years, our profession has devoted a great deal of attention to the mental health of a...

Best Practices for H...

This program will discuss who should be involved in an OSHA inspection, strategies when dealing with...

Cutting the Cord: Wh...

This program will cover the important (but often forgotten) professional responsibility and risk iss...

Silence in Court! Mo...

“Movement psychology” is a branch of psychology that emerged in the early twentieth cent...

Protecting and Enfor...

IPR theft in international trade is on the rise, with adverse consequences for workers, importers, c...

Reasonable Accommoda...

The case of Podell v. Department of Defense will be discussed, which addressed reasonable accommodat...

Transferring IP Asse...

This course, presented by Ana Juneja, founder of Ana Law LLC, delves into the vulnerabilities of IP ...