News & Analysis as of

Electronically Stored Information Encryption

U.S. Legal Support

Security Best Practices for Remote Depositions in the Digital Age

U.S. Legal Support on

Trial outcomes often hinge on witness testimony. Attorneys collect much of this testimony during a formal process called a deposition. A critical component of discovery, depositions traditionally occur in law offices or...more

Association of Certified E-Discovery...

[Event] eDiscovery Convergence 2024: From Basics to Breakthroughs in eDiscovery - November 20th, Toronto, ON, Canada

Join Us for eDiscovery Convergence 2024! This event is proudly hosted by the Ontario Digital Evidence and eDiscovery Working Group (DEED) and the Toronto Chapters of The Association of Certified eDiscovery Specialists...more

Cimplifi

Going Mobile: The Current Landscape of Mobile Device Discovery

Cimplifi on

There is no doubt that mobile devices have become a constant in our daily lives. We take them everywhere and we can’t seem to live without them, even for a few short hours. In fact, you may be reading this very blog on your...more

HaystackID

[Webinar] Solve the Digital Puzzle: Your Guide to Navigating Mobile Forensics’ Future - April 24th, 12:00 pm EDT

HaystackID on

With mobile devices being the epicenter of communication and data generation, successfully navigating a digital investigation hinges on your ability to handle the proliferation of this data. However, forensic investigators...more

EDRM - Electronic Discovery Reference Model

[Webinar] Uncovering Hidden Data: How to Collect the Mobile Data your Investigation is Missing - August 10th, 1:00 pm - 2:00 pm ET

The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more

HaystackID

[Webinar] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and Teams -...

HaystackID on

The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more

Nextpoint, Inc.

Attorney-Client Confidentiality: Practical Tips for Protecting Privilege

Nextpoint, Inc. on

The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more

EDRM - Electronic Discovery Reference Model

[Webinar] Mobile Elite: Powerful and Accessible Mobile Extractions at Your Fingertips - July 19th, 1:00 pm - 2:15 pm ET

Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more

Farrell Fritz, P.C.

Court Sends Signal to Parties Who Spoliated Documents Using Ephemeral Messages

Farrell Fritz, P.C. on

Ephemeral messaging applications are considered solutions for data protection and privacy concerns (Blink, And I’m Gone: E-Discovery Challenges and Considerations With Ephemeral Messaging). However, courts are wary of...more

Reveal

5 Best Practices For Protecting Sensitive Information During An Investigation

Reveal on

Organizations are feeling the pinch of compliance like never before as government agencies at every level are scrutinizing their business affairs more closely and issuing more regulations. To meet their compliance...more

Association of Certified E-Discovery...

Kangaroo Court: Understanding Blockchain

As a thought experiment, imagine there was a base metal as scarce as gold but with the following properties: boring grey in color, not a good conductor of electricity, not particularly strong but not ductile or easily...more

Spilman Thomas & Battle, PLLC

Decoded: Technology Law Insights - Issue 4, August 2020

Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more

Stange Law Firm, PC

New encrypted applications gaining prevelance

Stange Law Firm, PC on

In divorce and family law litigation, text, email and cell phone records are often important. In many cases, parties seek this evidence in discovery when it bears on relevant issues. Text, email and cell phone records can...more

ArentFox Schiff

FTC Reminds Auto Dealer Vendor to Slow Down & Consider Security

ArentFox Schiff on

The Federal Trade Commission (FTC) recently released updated data security guidance in connection with a proposed settlement with LightYear Dealer Technologies, LLC (dba DealerBuilt), a service provider for the auto dealer...more

Association of Certified E-Discovery...

Part 2: Is There an App for This? Reviewing and Producing Mobile Data

In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In this article, we turn to the types of information you can expect to encounter with mobile devices and key considerations...more

Robinson+Cole Data Privacy + Security Insider

Record Retention

An ongoing and frequent recent request is to assist clients with record retention guidelines and migrating from storing massive amounts of paper records to an electronic system. How to do this right cannot be fully...more

Fenwick & West LLP

EU GDPR eDiscovery — Top Ten Tips for Litigators

Fenwick & West LLP on

Overview (10. – 6.) - 10. The European Union (EU) General Data Protection Regulation (GDPR) went into effect on May 25, 2018. It applies to the processing of “personal data” of EU citizens and residents (a/k/a “data...more

Association of Certified E-Discovery...

Growing Business Use of “Chat Apps” Poses Information Risk for Corporate Legal Departments

A 2017 survey of business professionals worldwide found that the average business professional uses 9.4 software apps for work purposes. Nearly half of the respondents said they use apps that are not sanctioned by their...more

Epiq

Electronic Discovery Without Borders: Your Passport to Managing Multilanguage ESI

Epiq on

Although litigators today benefit from advanced technology to research and organize their cases, the evolution of electronic data and the internationalization of business are adding new complications that require...more

Bass, Berry & Sims PLC

Privacy Perils: Now You See Me ...

In the ongoing and contentious litigation between Uber and Google's autonomous (self-driving) vehicle unit (Waymo v. Uber), allegations have arisen that one party has hidden relevant information, in part by use of...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

As expected, the Fed left interest rates at current levels yesterday, though it hinted at another December rate hike and officially unveiled the start of its bond wind-down next month....more

Snell & Wilmer

California Updates Its Data Encryption & Breach Notification Laws

Snell & Wilmer on

On January 1, 2016, several updates to California’s digital privacy laws took effect. However, a trio of other bills, Assembly Bill 964, Senate Bill 34, and Senate Bill 570, have clarified key elements of California’s...more

Best Best & Krieger LLP

Federal Court Orders Apple to Unlock San Bernardino Gunman’s Phone

Apple must help the FBI unlock an iPhone used by one of the attackers in the San Bernardino, Calif. assault in December, a federal magistrate judge ruled this week. The ruling handed the government an important victory in an...more

Womble Bond Dickinson

Is Your HIPAA Compliance Program Ready for the FTC?

Womble Bond Dickinson on

Everyone in healthcare knows that the next round of HIPAA audits is coming. Covered entities and business associates have long been advised to review and update their HIPAA security risk analyses, have business associate...more

Proskauer on Privacy

Connecticut Updates its Data Security Laws, Imposing Stringent New Requirements

Proskauer on Privacy on

On June 30, 2015, the Governor of Connecticut signed into law S.B. 949, “An Act Improving Data Security and Agency Effectiveness." The new law updates Connecticut’s data security laws, including by adding a 90-day hard...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide