The Privacy Insider Podcast Episode 13: Preserving Privacy and Social Connection with Christine Rosen of the American Enterprise Institute
Innovations in Compliance: Data Collection & Cybersecurity with ModeOne’s Matt Rasmussen and Ryan Frye
Early Days of the Trump Administration: Impact on the CFPB — The Consumer Finance Podcast
CFPB's Inquiry Into Payments Privacy — Payments Pros – The Payments Law Podcast
Innovation in Second Requests: Data is Your Greatest Asset
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
Podcast - Bowling with Bumpers: Using a Privacy Framework to Set Your Company Up for a Strike
The Presumption of Innocence Podcast: Episode 48 - Digital Boundaries: Fourth Amendment Protections in a Connected World
eDiscovery Needs Digital Forensics for a Mobile World
A Sneak Peek into Data Mapping: What Implementation Really Looks Like
It's Time to Think About Data Mapping Differently
EEO-1 Filing After June 4: What to Do Now, and How to Prepare for Next Year - Employment Law This Week®
Navigating State Privacy Laws
[Webinar] You Are Here: First Steps in Data Mapping
An Ounce of Prevention: Keys to Understanding and Preventing AI and Cybersecurity Risks
Calculating eDiscovery Costs: Tips from Brett Burney
State AG Pulse | Content moderation vs. free expression
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
Navigating the Digital Frontier: Employee Privacy Rights and Legal Obligations in the Modern Workplace
Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more
When employees depart – voluntarily or involuntarily – they often leave behind a digital footprint that may be critical to investigations, litigation, or regulatory compliance. Ensuring their data is properly identified,...more
Mobile devices have fundamentally reshaped how we communicate, work, and live. With 91 percent of Americans owning a smartphone and spending nearly five hours per day on these devices, mobile devices have become integral to...more
Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more
For years, litigators focused on emails and corporate documents as the primary sources of discoverable evidence. But the way people communicate has changed. Today, crucial case evidence is just as likely—if not more likely—to...more
On February 18, 2025, at The Masters Conference in Miami, I had the privilege of speaking on a panel alongside Matt Rasmussen (ModeOne), Alex Lewis (Kuro Group), and Brittany Leonard (General Counsel) to discuss one of the...more
While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more
Discover essential strategies and tips for effective data collection across diverse digital landscapes, including mobile devices, social media, and collaboration platforms. This webcast will delve into how legal teams can...more
When it comes to discovery of mobile devices, it’s not just the data that’s important for discovery, but also the data about the data – the metadata – that can be used to authenticate evidence, to determine whether the data...more
New year, new case law! In our January 2025 monthly webinar of cases covered by the eDiscovery Today blog, we will discuss disputes related to whether emojis constitute contract agreement, privilege status of text messages,...more
The increasing role of mobile devices in eDiscovery is undeniable, with recent data showing that 97% of eDiscovery cases now involve mobile devices. As mobile data grows in complexity, legal teams are tasked with handling...more
If you ask most legal professionals about discovery of data from mobile devices, the discussion typically turns to text messages. However, there are several other data types unique to mobile devices that are not only...more
The Masters Conference’s final event for 2024 brought together legal, forensic, and information governance experts to discuss the evolving challenges in eDiscovery and data management. Hosted by King and Spalding in Atlanta,...more
Join us for a hands-on mobile phone collection experience and CLE abut recent cases involving mobile phone collections. Lunch provided. (Session 2 of 2)...more
Session 1 of 2. Join us for an exclusive, hands-on workshop where you’ll get to collect data from mobile devices (provided) in a dynamic, in-person setting. Following the workshop, enjoy a complimentary CLE luncheon and...more
There is no doubt that mobile devices have become a constant in our daily lives. We take them everywhere and we can’t seem to live without them, even for a few short hours. In fact, you may be reading this very blog on your...more
From the rapid advancements in the capabilities of mobile devices to our increasingly digital workplaces, how we communicate is less standardized and more complex. This has major implications for eDiscovery and demands a...more
Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more
Mobile forensic investigators often face significant challenges when triaging and collecting data from diverse devices, especially when dealing with cloud storage and cross-platform environments. The complexity of navigating...more
With organizations holding more and more data digitally, there is an increased need to ensure data remains accessible across the organization at any given time. To that end, many organizations use tools that synchronize the...more
[Editor’s Note: This article was first published August 21, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of...more
Despite the dominance of Windows computers in corporate environments, an increasing number of companies are now integrating Apple Mac computers into their networks. Alongside this shift, the rise of BYOD (Bring Your Own...more
[Editor’s Note: This article was first published July 24, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
Welcome to our event: Forensic investigations and what is/is not possible for retrieving, analyzing, and producing data from mobile devices. What data is available from applications, system files, etc....more
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more