Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
eDiscovery Needs Digital Forensics for a Mobile World
What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
In November 2024, the U.S. Department of Justice Antitrust Division (“Antitrust Division” or “Division”) updated its guidance on how it will evaluate Corporate Compliance Programs when conducting criminal antitrust...more
Earlier this week, the Antitrust Division updated its compliance guidance. The Division first issued guidance on its evaluation of corporate compliance programs in July 2019. This week’s updates follow multiple updates to the...more
What’s the Tea in L&E is a video series focused on the latest trends and updates in labor and employment law. In this short video, Woods Rogers L&E attorneys Leah Stiegler and Emily Kendall Chowhan discuss what content is...more
Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the week of July 8-14. Here’s what’s...more
The 2018 Regular Session of the Connecticut General Assembly passed bills that, among other things: (1) revise the Student Data Privacy Act; (2) address budgetary issues stemming from attempts at reducing and rescinding...more
In the first known case involving a wireless provider, a cardiology service provider agreed to pay a $2.5 million settlement based on the impermissible disclosure of unsecured electronic protected health information (ePHI)....more
Q: In my company, the IT directors see cybersecurity as an IT and software issue to be solved with software and hardware. How do I convince the team that employees need to also be trained on risky behavior – something that...more
A recent survey conducted by Arlington Research for OneLogin in May 2016 of 1,022 respondents found what most of us already know: employees continue to be a high risk for employers when it comes to security risk. The...more
The 2015 HIPAA Security conference held by the National Institute of Standards and Technology (“NIST”) and the U.S. Department of Health and Human Services, Office for Civil Rights (“OCR”) kicked off last week with OCR’s...more
An organization’s information can be put at risk when staff begin to bring their own devices and use them in the workplace. As a result, in such cases, an organization should consider adopting an appropriate “bring your own...more
As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more
One of your best defenses against a cyber attack? Your employees. Make sure they are trained on their role in protecting your organization. There are pros and cons to the digital world that we all live in. Pros include...more
On January 27, 2015, the FTC released its Staff Report on the so-called “Internet of Things” (IoT) – the ability of everyday objects (from refrigerators to wearable devices) to connect to the Internet and send and receive...more
The industry for mobile applications is growing rapidly. As companies and independent developers look to gain—or strengthen—footholds in this competitive space, the Federal Trade Commission (FTC) asks, “… is security keeping...more