Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
eDiscovery Needs Digital Forensics for a Mobile World
What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
With increasing digitalization of our lives and businesses, privacy concerns from border searches of phones, laptops and tables are a growing concern for professionals, executives, and frequent international travelers. U.S....more
When it comes to discovery of mobile devices, organizations today must consider being proactive regarding how mobile devices of their employees and contractors are managed and what rights they have regarding the storage and...more
There is no doubt that mobile devices have become a constant in our daily lives. We take them everywhere and we can’t seem to live without them, even for a few short hours. In fact, you may be reading this very blog on your...more
“Follow me on Instagram, will you?” That may seem like a harmless question to a colleague, but starting soon, New York will ban most employer inquiries regarding an employee’s personal social media account....more
In today’s highly connected, tech-obsessed world, personal electronic devices (“devices”), including tablet computers and mobile phones, are seemingly ubiquitous. Increasingly, employers are capitalizing on this phenomenon by...more
On January 11, 2022, the Israeli Supreme Court, in an expanded panel of nine justices, prescribed a set of rules concerning procedures and judicial discretion on the granting of search warrants of computers and cellular...more
In a closely watched decision, the US Court of Appeals for the First Circuit confirmed the government’s expansive authority to search cell phones, laptops, and other electronic devices at the border. On February 9, 2021, the...more
Can a fingerprint alone provide “testimony” about a person? Earlier this month, a federal court in California said yes. But the court was not engaging in a highly-localized form of palm-reading; rather, the question arose in...more
Did you know that there are likely billions of unprotected IP works in nearly every consumer electronic sitting on your desk or held in your hand? Today, it seems like every electronics device maker is announcing there are...more
U.S. Customs and Border Protection (“CBP”) recently updated its 2009 directive pertaining to border searches of electronic devices. The Supreme Court of the United States has deemed warrantless searches by CBP legal and...more
U.S. citizens who travel internationally, especially corporate executives and high-net-worth individuals, must consider and navigate data security risks when crossing a border—whether into the United States or another...more
In this month's edition of our Privacy & Cybersecurity Update, we discuss Poland's potential exemptions from the new EU data law and the Office of the Comptroller of the Currency's recommendations for U.S. banks faced with...more
You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design...more
The federal government is open. But less than three weeks remain under the current reprieve and another shutdown seems possible. Although the Federal Communications Commission tapped on-hand fees to support uninterrupted...more
The Tennessee Business Court, now in Phase II of the Pilot Project continues to deal with interesting and contemporary issues. In Universal Strategy Group v. Halstead, Case No. 16-15-BC, Chancellor Lyle held, after a bench...more
International travelers have been reporting that cell phones, computers, and other communication devices are being seized by Officers of the U.S. Customs and Border Protection (“USCBP”) branch of the U.S. Department of...more
Employers have long understood that what their employees do on company time is directly linked to the company’s own potential liabilities. When employees using mobile electronic devices cause harm, their carelessness isn’t...more
On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA” or the “Act”), sponsored by Senator Mark Leno (D-San Francisco). The Act requires law...more
On Thursday, October 8, 2015, California Governor Jerry Brown signed into law the Electronic Communications Privacy Act (the “California ECPA”). This legislation, which takes effect on January 1, 2015, has been heralded by...more
Law enforcement requests for electronic information, particularly from technology companies such as Google and Twitter, have skyrocketed in recent years. In response, several states—Maine and Texas in 2013, Utah in 2014 and...more
As consumers increasingly connect to the Internet using multiple devices—such as mobile phones, tablets, computers, TVs and wearable devices—advertising technology companies have rapidly developed capabilities to reach the...more
Trekkies and modest Star Trek fans may recall the plot in an episode known as “The Enemy Within” where a malfunction in a transporter causes Captain Kirk to be split into two - a good Captain Kirk and an evil Captain Kirk....more
While the need to authenticate evidence is not new, the types of evidence that trial lawyers need to authenticate is. Social media evidence is one example. While not the type of evidence most practitioners are accustomed...more
Reversing a Superior Court ruling that had caused quite a splash a few months ago, in City of San Jose v. Superior Court (H039498, March 27, 2014), the Sixth District of the Court of Appeal has held that communications to and...more
In a rare move, on August 3, 2013, the United States Trade Representative of the Executive Office of the President (USTR) issued a letter disapproving the United States International Trade Commission's (ITC's) determination...more