News & Analysis as of

Mobile Devices Email

EDRM - Electronic Discovery Reference Model

Optimizing the Remote Reach: Strategies for Secure and Efficient Data Collection

The digital revolution has irrevocably transformed the way we conduct business, and investigations are no exception. The surge in remote work models has rendered traditional on-site data collection methods increasingly...more

Good2bSocial

15 Tips to Optimize Law Firm Email Marketing Campaigns

Good2bSocial on

Email has been an essential part of professional marketing since it was invented. Though tools have gotten more sophisticated and the best practices for using them have evolved, email is still one of the most effective...more

Bracewell LLP

Personal Devices and Messaging Platforms in the Workplace: Tips, Tactics and Best Practices for In-House Counsel

Bracewell LLP on

Federal regulators have cracked down on the use of texts messages and messaging platforms for business communications, using their broad authority to root out record retention violations, resulting in significant fines and...more

K2 Integrity

Navigating Work and Travel: Essential Actions for Companies Looking to Keep Their Data Secure

K2 Integrity on

Many organizations give employees the ability to work from anywhere, adding convenience and flexibility to work and personal schedules. However, with this flexibility comes responsibility—the responsibility to protect the...more

EDRM - Electronic Discovery Reference Model

[Webinar] Important eDiscovery Case Law Decisions for August 2023 - August 30th, 1:00 pm - 2:00 pm ET

It’s not a heat wave, it’s a wave of hot eDiscovery case law disputes! Our August 2023 monthly webinar of cases covered by the eDiscovery Today blog discusses six disputes including a motion to compel a forensic examination...more

StoneTurn

eDiscovery and Forensic Investigations: Six Tips for Managing Company Messaging Protocols

StoneTurn on

The world of workforce communication looks vastly different from 2020, including an increased blur between personal and business communications due to remote work environments and access to instant messaging and...more

EDRM - Electronic Discovery Reference Model

[Webinar] eDiscovery Forensics for an Evolving Digital Landscape - November 1st, 1:00 pm ET

Join Ricoh and forensics subject matter expert Peter Garza as we give you an insider’s look into the latest in forensics across the evolving digital landscape. Making sense of data collection from the fully remote workplace...more

EDRM - Electronic Discovery Reference Model

[Webinar] Best Practices for Gathering and Analyzing Key Messaging Data - April 12th, 1:00 pm ET

After collecting, analyzing the volume of data found on devices can be overwhelming. Attorneys and eDiscovery practitioners need the ability to gather insights across a variety of data sources, especially third-party...more

Jackson Lewis P.C.

Employee Monitoring: New York Establishes New Requirements for Employers

Jackson Lewis P.C. on

Earlier this month, New York Governor Kathy Hochul signed into a law a bill that will require New York private sector employers to provide written notice to employees before engaging in electronic monitoring of their...more

Goodwin

Litigation Insights - July 2021

Goodwin on

FOREWORD - On behalf of the new and expanding Goodwin London litigation team I am delighted to welcome you to our first ever ‘Litigation Insights’: a series of quarterly updates on important and interesting developments...more

McGuireWoods LLP

New Year, Old Problem: Broker-Dealers Should Evaluate Their Supervision of Personal Device Use

McGuireWoods LLP on

Many companies that transitioned to a work-from-home environment in early 2020 may have reasonably anticipated a return to the normalcy of in-office operations by the end of the year. Yet as 2021 commences, remote work has...more

Franczek P.C.

Illinois Appellate Courts Focus on FOIA

Franczek P.C. on

Last week, the Illinois Appellate Court issued three separate opinions addressing the scope of the Illinois Freedom of Information Act (FOIA). The opinions provide additional guidance related to what constitutes a reasonable...more

Nancy Myrland - Myrland Marketing & Social...

Are Younger Lawyers Naturally Better At Social Media?

Are digital natives, those who were born in an era when electronic devices were prevalent and in their hands from the moment they were old enough to hold them, better equipped in this current era of social and digital media?...more

Hogan Lovells

2019 crisis leadership in review

Hogan Lovells on

What starts online won't stop there - There aren't many college basketball games that change the share price of a Fortune 100 company. But in February 2019, Duke University freshman star Zion Williamson blew out one of his...more

Shook, Hardy & Bacon L.L.P.

Privacy and Data Security Alert | December 2019

SDNY Rejects Standing under “Increased Risk” Theory Where Data Not Targeted or Stolen - The Southern District of New York rejected a settlement that would have resolved a class action based on the unauthorized (and...more

Foley & Lardner LLP

Resist the Urge to Access: the Impact of the Stored Communications Act on Employer Self-Help Tactics

Foley & Lardner LLP on

As an employer or manager, have you ever collected a resigning employee’s employer-owned laptop or cellphone and discovered that the employee left a personal email account automatically logged in? Did you have the urge to...more

Reveal

It’s Not Just About the Money (or Privacy): The Role of Specificity, Technology, and FRCP Rule 26

Reveal on

What Does Rule 26 Say about Scope and Proportionality? In 2015, when the Federal Rules of Civil Procedure were amended, the issue of scope and Rule 26 was a hot topic of discussion, mainly around the issue of costs. But...more

Reveal

Two Murder Investigations in the Last Week Highlight eDiscovery’s Role in Criminal Investigations

Reveal on

Two recent murder cases have again highlighted the use of electronic forensics to solve cases that only a few decades ago, would have been difficult to crack in the relatively short time frame between the crime and the...more

Skadden, Arps, Slate, Meagher & Flom LLP

Delaware Supreme Court Clarifies When Emails Should Be Produced

On January 29, 2019, the Delaware Supreme Court provided guidance to the Court of Chancery regarding the scope of a stockholder’s inspection rights under Section 220 of the Delaware General Corporation Law or similar LLC or...more

Franczek P.C.

According to the PAC, Communications About Public Business on Personal Devices Subject to FOIA

Franczek P.C. on

Since a 2013 Illinois Appellate Court decision, City of Champaign v. Madigan, Illinois public bodies have known that three categories of emails and text messages sent to or from personal technology devices are “public...more

Bennett Jones LLP

Cybersecurity—Loss Due to Social Engineering Attack Covered Under Insurance Policy

Bennett Jones LLP on

As the number and sophistication of social engineering attacks increases, victims are examining their insurance policies to see if they are covered. In The Brick Warehouse LP v. Chubb Insurance Company of Canada, 2017 ABQB...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #135 – Cybersecurity Spring Cleaning Tips

Here’s a great idea offered by the National Cyber Security Alliance and the Better Business Bureau: while you are doing your spring cleaning, don’t forget to do a digital spring cleaning too—that is, your computer, cellphone...more

Orrick - Employment Law and Litigation

Pulling the Plug: New York City Bill Would Give Workers the “Right to Disconnect”

It is now the norm to see passersby glued to their phones as they make their morning trek into work. And when those employees head home, they are often unable to “leave work at the office” as they continue to respond to...more

Bennett Jones LLP

Top 10 Tips for Cybersecurity Employee Training

Bennett Jones LLP on

Any system is only as strong as its weakest link. If your employees aren’t up to date on their cybersecurity hygiene, then it doesn’t matter how much money you spend on technological defences—there’s a gap in your protection....more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - October 2017 #3

Robinson & Cole LLP on

Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more

40 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide