The First Steps to a Paperless Law Office: Austin Lawyer D. Todd Smith
For eDiscovery and digital forensics experts, there are some frequently occurring actions we’ve seen that can hamper our ability to perform thorough and effective forensics investigations. This blog is designed to give a...more
Offboarding employees after they've resigned or been terminated is largely a routine process; they turn in their devices, which can then be imaged and archived. But are you routinely investigating their computer activity...more
Employee data theft happens frequently, and especially in current times where employees are leaving or being terminated. Some may be due to layoffs while others may leave for personal or other reasons. However, there is...more
Two Recent Cases Highlight the Spoliation Thresholds in Rule 37(e) - With the 2015 FRCP amendments quickly nearing a half-decade in existence, case-law continues to define how these rules are upheld in court, especially...more
On June 6, 2017, the First Department had an opportunity to apply—and reaffirm—last month’s decision in Peerenboom v. Marvel Entm’t, LLC, where the Court held that use of a company email system for personal purposes “does...more
In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more