News & Analysis as of

Data Collection Encryption

HaystackID

[Webinar] Solve the Digital Puzzle: Your Guide to Navigating Mobile Forensics’ Future - April 24th, 12:00 pm EDT

HaystackID on

With mobile devices being the epicenter of communication and data generation, successfully navigating a digital investigation hinges on your ability to handle the proliferation of this data. However, forensic investigators...more

Spilman Thomas & Battle, PLLC

Are Automakers Making Sufficient Efforts to Protect Customer Data?

With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National Highway Traffic Safety Administration (“NHTSA”) has broad regulatory...more

EDRM - Electronic Discovery Reference Model

[Webinar] Uncovering Hidden Data: How to Collect the Mobile Data your Investigation is Missing - August 10th, 1:00 pm - 2:00 pm ET

The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more

Cozen O'Connor

AG James Alleges Sporting Goods Retailer Whiffed on Defending Consumer Data

Cozen O'Connor on

New York AG Letitia James settled with Sports Warehouse, Inc. and affiliated entities to resolve allegations that the online sporting goods retailer maintained poor data security practices that led to the compromise of...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

BakerHostetler

OCR Provides Guidance on the Privacy of Data Stored on Health Apps and Mobile Devices

BakerHostetler on

In the wake of the U.S. Supreme Court’s decision in Dobbs v. Jackson Women’s Health Organization, many individuals and organizations have expressed uncertainty about the protection afforded to data stored on health apps,...more

EDRM - Electronic Discovery Reference Model

[Webinar] Mobile Elite: Powerful and Accessible Mobile Extractions at Your Fingertips - July 19th, 1:00 pm - 2:15 pm ET

Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more

Bass, Berry & Sims PLC

Privacy Peril: ConTextual

In our previous Privacy Peril tip, we noted how thieves are now spoofing law firms (and other businesses) through use of informal messaging apps. These fiends play off the perception of law firm integrity to overcome the...more

Vinson & Elkins LLP

FTC Announces Settlement With Zoom Resolving Data Security Concerns

Vinson & Elkins LLP on

On November 9, 2020, the U.S. Federal Trade Commission (“FTC”) announced a proposed settlement with Zoom Video Communications, Inc. (“Zoom”), a video conferencing provider, to resolve claims that Zoom deceived users about the...more

Onna Technologies, Inc.

How to Maintain CCPA Compliance in the Cloud

As more organizations find themselves under scrutiny for the way they collect and use consumer data, maintaining CCPA compliance has never been more important. CCPA has been introduced to give control back to consumers,...more

Partridge Snow & Hahn LLP

Bringing Your Business Online: Written Information Security Programs (WISPs)

The current COVID-19 pandemic has forced many businesses online in order to survive. In many cases, businesses had no plans to be online. Others were forced to move online more quickly than planned. In order to assist these...more

Akin Gump Strauss Hauer & Feld LLP

Recent FTC Settlements Highlight Risks of Flawed Information Security Practices and Related Representations

In a set of recent settlements, the Federal Trade Commission (the FTC or Commission) resolved charges against two companies, ClixSense and D-Link, for failing to provide reasonable security and to live up to their data...more

Foley Hoag LLP - Security, Privacy and the...

China's Internet Regulator Drafts COPPA-Like Rules for Children's Data Privacy

In early June, the Cyberspace Administration of China released for public comment new draft regulations applicable to the collection of personal information relating to children under 14 by online service providers. The...more

Association of Certified E-Discovery...

Part 2: Is There an App for This? Reviewing and Producing Mobile Data

In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In this article, we turn to the types of information you can expect to encounter with mobile devices and key considerations...more

Shook, Hardy & Bacon L.L.P.

Privacy and Data Security Client Alert | January 2019

Going Deep on the California Consumer Privacy Act - The California Consumer Privacy Act (CCPA) has been called the beginning of America’s GDPR. As the most comprehensive privacy law in the United States, entities doing...more

Foley Hoag LLP - Security, Privacy and the...

Privacy and Data Security Strategies for Start-Up Companies

Start-up companies know that, when potential investors kick the tires, they will look carefully at the company’s business model and IP portfolio. These days, investors are also likely to look at whether the company is in...more

Sheppard Mullin Richter & Hampton LLP

US Breach Laws Are Coming: Vermont

On January 1, 2019 Vermont’s breach notice law will include obligations specific to data brokers. A “data broker” is defined as a business that “knowingly collects and sells or licenses to third parties the brokered personal...more

Akin Gump Strauss Hauer & Feld LLP

California Passes Landmark Consumer Privacy CCPA—What it Means for Businesses

• California recently passed the landmark California Consumer Privacy Act that goes into effect in 2020, which grants California residents new privacy rights. • The CCPA creates a private right of action for California...more

Snell & Wilmer

What’s Unique About the California Consumer Privacy Act

Snell & Wilmer on

The California Consumer Privacy Act of 2018 (“CCPA”) offers a new, very broad framework for data protection with increased obligations for businesses, and its reach is far and wide. It was passed in a whirlwind seven days. On...more

Fisher Phillips

California Lawmakers Pass Sweeping New Data Privacy Law - Last-Minute Legislative Compromise Opens Door To Liability And...

Fisher Phillips on

Due to some last-minute bargaining between state lawmakers and proponents of a controversial data privacy initiative, California businesses will soon need to prepare to comply with a new state measure designed to protect...more

Fenwick & West LLP

EU GDPR eDiscovery — Top Ten Tips for Litigators

Fenwick & West LLP on

Overview (10. – 6.) - 10. The European Union (EU) General Data Protection Regulation (GDPR) went into effect on May 25, 2018. It applies to the processing of “personal data” of EU citizens and residents (a/k/a “data...more

Fisher Phillips

Collection of Biometric Data Raises Privacy Concerns for Employees and Compliance Issues for Employers

Fisher Phillips on

Many of us have become comfortable with the convenience of logging into our laptops or smartphones using a fingerprint scan in lieu of remembering yet another password. We are familiar with television and movie portrayals of...more

Epiq

Electronic Discovery Without Borders: Your Passport to Managing Multilanguage ESI

Epiq on

Although litigators today benefit from advanced technology to research and organize their cases, the evolution of electronic data and the internationalization of business are adding new complications that require...more

Bass, Berry & Sims PLC

Privacy Perils: The Internet of Things

Bass, Berry & Sims PLC on

The Internet of Things (IoT) is a network of connected devices that are able to collect and share data using embedded sensors. Smart homes are an area where IoT is heavily used. For example, using your cell phone while in...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide