What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
Corporate Law Report: Global HR, Textual Harassment, Working Interviews, and Other Workplace Issues
E-Books Empower Lawyers to Publish on Specialized Subjects They Couldn’t Previously
Friday, June 2, 2023: FAR Council’s Interim Rule Banned TikTok on Federal Government Contractor Devices - August 1 Deadline for Public Comments on Interim Rule - Ban Implemented Due to National Security Concerns - ...more
The Supreme Court has vacated the U.S. Court of Appeals for the Ninth Circuit’s decision upholding a Berkeley, California ordinance requiring cell phone retailers to warn customers about potential radiofrequency (RF) safety...more
The Supreme Court of the United States issued six decisions today: WesternGeco LLC v. ION Geophysical Corp., No. 16-1011: Petitioner WesternGeco LLC owns patents relating to a system for surveying the ocean floor. ...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
In 1986, Congress passed an obscure statute called the Stored Communications Act that has become much more relevant 30 years later. The U.S. Supreme Court will have two opportunities to help define the scope of digital...more
We previously reported that government access to cellphone geographic information or CSLI without a warrant has become a vigorous debate between the government, defense attorneys, and the federal bench. In a lengthy opinion,...more
SPECIAL FOCUS: FCC Adopts Significant Changes to TCPA Rules - FCC Chairman Tom Wheeler’s proposal to revise the Telephone Consumer Protection Act rules passed by a 3-2 vote during yesterday’s Open Commission Meeting....more
In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more
Two recent opinions have significantly restricted the practice of warrantless collection of data stored on cell phones or by cell phone service providers. In Riley v. California the U.S. Supreme Court confirmed that a warrant...more
The United States Supreme Court has ruled that police officers must generally secure a warrant before searching through the contents of a cell phone of a person they arrest. This decision will have important implications for...more
On June 25, 2014, the Supreme Court of the United States decided Riley v. California, No. 13-132, and United States v. Wurie, No. 13-212, holding that police must generally obtain a warrant before searching a cell phone...more
Overview: Today, the U.S. Supreme Court held that police officers may not search digital information on a mobile phone device seized from a person who has been arrested without a warrant. In Riley v. California and U.S. v....more
Recent revelations concerning the activities of the National Security Agency (“NSA”) include reports that the NSA and other government agencies have – in secret – routinely collected in bulk the “metadata” associated with...more
The holidays have come and gone. I hope everyone enjoyed them, and I hope everyone received the gifts and presents they asked for. I come from a big family—three siblings, 14 aunts and uncles, and nearly twenty cousins....more
Our latest video report looks at the employment needs of global companies, textual harassment, working interviews, and other labor & employment law issues. This week we're focused entirely on workplace legal issues -...more