Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
eDiscovery Needs Digital Forensics for a Mobile World
What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
Alabama and Oklahoma have become the latest states to ban from state-owned devices and networks certain AI tools with links to foreign governments. ...more
When employees depart – voluntarily or involuntarily – they often leave behind a digital footprint that may be critical to investigations, litigation, or regulatory compliance. Ensuring their data is properly identified,...more
Mobile devices have fundamentally reshaped how we communicate, work, and live. With 91 percent of Americans owning a smartphone and spending nearly five hours per day on these devices, mobile devices have become integral to...more
Malicious insiders are the silent threats lurking within organizations—employees, contractors, or partners with privileged access who can cause devastating data breaches. With the rise of remote work and mobile-first business...more
For years, litigators focused on emails and corporate documents as the primary sources of discoverable evidence. But the way people communicate has changed. Today, crucial case evidence is just as likely—if not more likely—to...more
On February 18, 2025, at The Masters Conference in Miami, I had the privilege of speaking on a panel alongside Matt Rasmussen (ModeOne), Alex Lewis (Kuro Group), and Brittany Leonard (General Counsel) to discuss one of the...more
While data from mobile devices is more frequently responsive in civil litigation than ever before, “true crime” aficionados know it’s routinely useful in criminal investigations. We take our devices with us and use them...more
Discover essential strategies and tips for effective data collection across diverse digital landscapes, including mobile devices, social media, and collaboration platforms. This webcast will delve into how legal teams can...more
When it comes to discovery of mobile devices, it’s not just the data that’s important for discovery, but also the data about the data – the metadata – that can be used to authenticate evidence, to determine whether the data...more
New year, new case law! In our January 2025 monthly webinar of cases covered by the eDiscovery Today blog, we will discuss disputes related to whether emojis constitute contract agreement, privilege status of text messages,...more
The increasing role of mobile devices in eDiscovery is undeniable, with recent data showing that 97% of eDiscovery cases now involve mobile devices. As mobile data grows in complexity, legal teams are tasked with handling...more
If you ask most legal professionals about discovery of data from mobile devices, the discussion typically turns to text messages. However, there are several other data types unique to mobile devices that are not only...more
The Masters Conference’s final event for 2024 brought together legal, forensic, and information governance experts to discuss the evolving challenges in eDiscovery and data management. Hosted by King and Spalding in Atlanta,...more
Join us for a hands-on mobile phone collection experience and CLE abut recent cases involving mobile phone collections. Lunch provided. (Session 2 of 2)...more
Session 1 of 2. Join us for an exclusive, hands-on workshop where you’ll get to collect data from mobile devices (provided) in a dynamic, in-person setting. Following the workshop, enjoy a complimentary CLE luncheon and...more
There is no doubt that mobile devices have become a constant in our daily lives. We take them everywhere and we can’t seem to live without them, even for a few short hours. In fact, you may be reading this very blog on your...more
From the rapid advancements in the capabilities of mobile devices to our increasingly digital workplaces, how we communicate is less standardized and more complex. This has major implications for eDiscovery and demands a...more
Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more
Mobile forensic investigators often face significant challenges when triaging and collecting data from diverse devices, especially when dealing with cloud storage and cross-platform environments. The complexity of navigating...more
With organizations holding more and more data digitally, there is an increased need to ensure data remains accessible across the organization at any given time. To that end, many organizations use tools that synchronize the...more
[Editor’s Note: This article was first published August 21, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of...more
Despite the dominance of Windows computers in corporate environments, an increasing number of companies are now integrating Apple Mac computers into their networks. Alongside this shift, the rise of BYOD (Bring Your Own...more
[Editor’s Note: This article was first published July 24, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of the...more
Welcome to our event: Forensic investigations and what is/is not possible for retrieving, analyzing, and producing data from mobile devices. What data is available from applications, system files, etc....more
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more