News & Analysis as of

Evidence Encryption

EDRM - Electronic Discovery Reference Model

[Webinar] Uncovering Hidden Data: How to Collect the Mobile Data your Investigation is Missing - August 10th, 1:00 pm - 2:00 pm ET

The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

EDRM - Electronic Discovery Reference Model

[Webinar] Mobile Elite: Powerful and Accessible Mobile Extractions at Your Fingertips - July 19th, 1:00 pm - 2:15 pm ET

Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more

Planet Depos, LLC

Keeping the Record Sealed: Secure your Case Information and Documents

Planet Depos, LLC on

Security and confidentiality are paramount in legal matters. Even if a case matter has no protective order or confidential designation, you don’t want your clients’ information compromised in any way. It is a non-negotiable...more

Stange Law Firm, PC

New encrypted applications gaining prevelance

Stange Law Firm, PC on

In divorce and family law litigation, text, email and cell phone records are often important. In many cases, parties seek this evidence in discovery when it bears on relevant issues. Text, email and cell phone records can...more

Mintz - Privacy & Cybersecurity Viewpoints

Massachusetts High Court Permits Compelled Decryption of Seized Digital Evidence

Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide