News & Analysis as of

Mobile Devices Best Practices

Association of Certified E-Discovery...

[Event] What's in your smartphone? - March 28th, Vancouver, BC, Canada

As in personal life, mobile devices and AI are now ubiquitous in eDiscovery. Join ACEDS Vancouver and OpenText Legal Tech for an interactive lunch-and-learn to see what data can be extracted from smartphones and how that data...more

Ward and Smith, P.A.

Senior Savvy: Wise Owls Navigating Cyber Scams

Ward and Smith, P.A. on

As the relentless march of technology continues, scams have evolved into cunning traps, presenting a challenge to individuals of all ages. Among the great tapestry of age groups, despite the wealth of experience and...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

TransPerfect Legal

Best Practice Mobile Device Collection: iPhone Versus Android

TransPerfect Legal on

It is safe to say that most of the world’s adult (and child) population owns or has access to a mobile phone. These devices are capturing all kinds of private and sensitive data—some of which is generated by the user, while...more

EDRM - Electronic Discovery Reference Model

[Webinar] Best Practices for Gathering and Analyzing Key Messaging Data - April 12th, 1:00 pm ET

After collecting, analyzing the volume of data found on devices can be overwhelming. Attorneys and eDiscovery practitioners need the ability to gather insights across a variety of data sources, especially third-party...more

Association of Certified E-Discovery...

[Webinar] Discovery in a Disappearing World - January 19th, 12:00 pm - 1:00 pm PT

In this webinar, presented by TransPerfect Legal Solutions in conjunction with ACEDS, lean from leading forensics experts on best practices and pitfalls to defensibly acquire data from mobile device applications and...more

Baker Donelson

Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation

Baker Donelson on

Trent Livingston has been the CEO of ESI Analyst since 2018. Trent started his career as a software test engineer and developer at Microsoft before entering the eDiscovery marketplace in the early 2000s. He has since provided...more

Kramer Levin Naftalis & Frankel LLP

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Hogan Lovells

2019 crisis leadership in review

Hogan Lovells on

What starts online won't stop there - There aren't many college basketball games that change the share price of a Fortune 100 company. But in February 2019, Duke University freshman star Zion Williamson blew out one of his...more

Shook, Hardy & Bacon L.L.P.

Privacy and Data Security Alert | December 2019

SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more

Bass, Berry & Sims PLC

Privacy Perils: I Spy Your Wi-Fi

Bass, Berry & Sims PLC on

Public Wi-Fi networks are a wonderful thing, particularly if you subscribe to a limited carrier data plan and have spent the month streaming Bachelor in Paradise or your favorite NCAA and NFL teams’ games. However, by...more

Dickinson Wright

If You Don’t Need It, Don’t Pack It: Border Searches of Mobile Devices

Dickinson Wright on

Currently there are a number of pending cases concerning the issue of whether Border searches can include a search of someone’s cellphone. On March 15, 2018, a divided 11th Circuit Court, upheld the conviction of a Florida...more

Seyfarth Shaw LLP

Cybersecurity Best Practices

Seyfarth Shaw LLP on

When you bring to mind someone “hacking” a computer one of the images that likely comes up is a screen of complex code designed to crack through your security technology. Whereas there is a technological element to every...more

BCLP

Retailers Should Be Aware of Data Privacy Concerns With Bring Your Own Device Policies

BCLP on

Many retailers permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

BCLP

Bring Your Own Device (“BYOD”) Policies

BCLP on

Many companies permit their employees to use personal mobile devices, such as smartphones and tablets, to access company-specific information, such as email, under a Bring Your Own Device (“BYOD”) policy. BYOD policies can be...more

Nossaman LLP

[Event] Stay Ahead: Nossaman's 2017 Emerging Employment Issues Seminar - Feb 8th, 9th,15th & 16th - Four California Locations

Nossaman LLP on

Please join us for this complimentary presentation on cutting-edge employment law issues. California and federal employment laws are constantly developing and evolving so it is essential for human resource professionals and...more

Blake, Cassels & Graydon LLP

Top 10 Issues for Employers, Issue #6: Balancing BYOD Programs with Expectations of Privacy at Work

This is the sixth instalment in our Top 10 Issues for Employers series. OVERVIEW - The workplace practice of bring your own device (BYOD) has hit the mainstream as more and more employees use their own mobile...more

Carlton Fields

Online Behavioral Advertising Guidelines Go Mobile

Carlton Fields on

On September 1, the Digital Advertising Alliance (DAA) began enforcing its guidelines for online behavioral advertising regarding mobile advertising. The DAA, a notfor-profit independent body, develops industry-best practices...more

Polsinelli

Mobile Health Devices and Cybersecurity: Federal Guidance for Management of Threats in Medical Devices

Polsinelli on

New Technology = New Threats - With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating. The...more

Bennett Jones LLP

Privacy Commissioners Issue Joint Guidance on Bring Your Own Device Programs

Bennett Jones LLP on

An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more

Davis Wright Tremaine LLP

NIST Issues Draft Guidance for Mobile Health Data

With health care breaches constantly on the rise, increasing access to electronic health records (EHRs) from mobile devices, and more prevalent “shadow” cloud use, health care organizations are getting a bit of help from the...more

21 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide