Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
eDiscovery Needs Digital Forensics for a Mobile World
What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
The increasing role of mobile devices in eDiscovery is undeniable, with recent data showing that 97% of eDiscovery cases now involve mobile devices. As mobile data grows in complexity, legal teams are tasked with handling...more
Apple recently announced it will be releasing its new mobile operating system, iOS 16, on September 12. The update will be available to iPhone 8 devices and newer. Although the new operating system will include some of the...more
Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more
In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In Part 2, we turned to the types of information you can expect to encounter with mobile devices and key considerations for...more
Currently there are a number of pending cases concerning the issue of whether Border searches can include a search of someone’s cellphone. On March 15, 2018, a divided 11th Circuit Court, upheld the conviction of a Florida...more
It’s easy to get lost in the abyss of technical jargon when discussing Electronically Stored Information (ESI). However, good information governance, which is one of the cornerstones of data privacy and security, doesn’t have...more
Employers who don’t think they need a bring-your-own-device policy should consider this: Nearly 70 percent of millennials and 31 percent of baby boomers surveyed last year by TrackVia admitted to using their own devices and...more