Spring Cleaning for Legal Teams: The Cloud and Defensible Deletion of Data
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Data Privacy and Security 101: Six Questions to Ask Yourself
Step into Wonderland and ensure you’re equipped to handle intellectual property theft investigations by seeing the entire picture of what’s on employee’s devices — even deleted data. Take a Curious Stroll Through the...more
The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more
Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more
In the past year and a half, I’ve written about at least three cases involving the use of ephemeral messaging apps during litigation. As you can imagine, the ramifications for doing so weren’t great. But what about using...more