Data Governance for the BYOD Age
Corporate Compliance and Enforcement Hot Topics with IBM VP, Una Dean
Digital Workplace Issues
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
Study Reveals Alarming Statistics On Theft and Employee Misuse of Company Data
Safeguards against Data Security Breaches (Part One)
Corporate Law Report: Managing Cyber Risks, BYOD, Obama's NLRB Crisis, Iran Sanctions, and More
Maine employers will soon face new restrictions and disclosure requirements when they use computers, phones, or other electronic equipment to monitor their employees under a new law. Maine joins New York, Connecticut, and...more
Maine Governor Janet Mills recently allowed LD 61 – An Act to Regulate Employer Surveillance to Protect Workers – to become law without her signature. This law, which takes effect this summer, applies to all Maine employers,...more
On November 25, 2025, the Cybersecurity and Infrastructure Security Agency (“CISA”) issued an alert regarding advanced spyware campaigns targeting mobile devices. The warning identifies messaging apps and social media...more
Remote and hybrid work, once a novelty, is now integrally incorporated into how many employees work effectively forever. Employers and employees alike have settled into longer term remote working arrangements that have...more
Mobile devices have become central to how we work, communicate, and collaborate – which means they are now a major source of evidence in modern litigation. As smartphones, tablets, and laptops continue to store more...more
Hybrid work isn’t new anymore — it’s the norm. Employees collaborate across offices, home workspaces, mobile devices, chat apps, and cloud platforms without thinking twice about how their actions complicate eDiscovery....more
Advocate General Medina issued a well‑reasoned opinion in Joined Cases C‑258/23 to C‑260/23 before the Court of Justice of the EU (CJEU) that may allow national competition authorities to seize business emails during dawn...more
Asia’s digital environment—particularly China’s mobile-first business culture and evolving regulatory landscape—is necessitating global companies to rethink Bring Your Own Device (BYOD) programs. Traditional “one device fits...more
The explosion in the volume of data over the past 15 years has significantly impacted the practice of electronic discovery, the increasing variety of data has probably forced the most changes in eDiscovery workflows. There...more
The ubiquity of off-network messaging applications presents a major challenge for legal and compliance functions. While offering convenience and immediacy, these platforms operate largely outside traditional corporate IT...more
Let’s talk about something that doesn’t get enough attention: protecting your employees’ sensitive personal information. In today’s digital world, keeping your team’s data safe isn’t just a nice-to-have—it’s absolutely...more
Recently, we had interesting questions from a client that was implementing two-factor authentication for employees to access the company’s information systems. The process requires employees to install the authentication app...more
The Maine Legislature recently passed a bill that could soon place new limits on employers’ ability to conduct surveillance in the workplace and create new categories of enforcement action state labor officials. Due to the...more
eDiscovery case law disputes are racing toward us! In our May 2025 monthly webinar of cases covered by the eDiscovery Today blog we will discuss disputes related to certification of production and discovery errors,...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of April 6-12. Here’s what’s...more
When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more
Over the past decade, technological innovations have quickly transformed how companies operate their IT infrastructure. Traditional on-site servers and hardware have often been replaced or supplemented by off-site solutions...more
Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online. It is an opportunity to focus on four key behaviors...more
Corporate use of third-party messaging platforms, including ephemeral messaging tools (which allow messages to disappear), is quite common and has become both a cost efficiency for employers and a convenient way for employees...more
Welcome to the Summer 2024 issue of “FCA Enforcement & Compliance Digest,” our quarterly newsletter in which we compile essential updates on False Claims Act (FCA) enforcement trends, litigation, agency guidance, and...more
In the era of technology-driven workplaces, Bring Your Own Device (BYOD) policies have emerged as a significant trend. A BYOD policy allows employees to use their personal devices, such as smartphones, for work purposes,...more
I. The Phenomenon of Instant Messaging- Evolution and Proliferation- From basic platforms like IRC and AIM to globally dominant apps such as WhatsApp and Telegram, instant messaging (IM) has witnessed a radical...more
I always welcome any chance to use references to The Mandalorian series on Disney (or Ashoka for that matter) in the compliance arena. My take on the issue of electronic communications and ephemeral messaging is rooted in...more
One thing you can count on — change. Not that there is anything wrong with that, but not to be too dramatic, we are at the precipice of some significant technology trends that will have a profound impact on corporate...more
This post provides tips from our eDiscovery experts on the identification and preservation of chat data during an investigation - Chat data will inevitably need to be collected for review if an investigation or dispute...more