Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
eDiscovery Needs Digital Forensics for a Mobile World
What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
Unlocking Your Cell Phone Is Now Illegal, but Not for Long
Hot Trends in Federal Enforcement on the Web in 2013 from Ifrah Law Partners
Foreign nationals visiting the United States, and even returning U.S. citizens and other legal residents (with valid visas), face increasing digital privacy risks and potential entry challenges when arriving at U.S. ports of...more
On November 21, 2024, the Federal Communications Commission (FCC), in a bipartisan and unanimous action, adopted final rules on cellular-vehicle-to-everything (C-V2X) technology in a Second Report and Order governing...more
For decades, the U.S. Surgeon General has shined a light on hazards to the health of Americans, both for individuals and society at large. The beacons have worked to persuade lots of people to improve health habits....more
As calls for executive accountability for cybersecurity intensify, it is essential for companies to scrutinize the adequacy of ephemeral messengers, such as Signal, WhatsApp, WeChat, and Snapchat, in light of both present and...more
Why don’t our new privacy laws really protect our privacy? Are we going about this the wrong way? The topic was raised in the recent Capital Forum of state and federal enforcement agencies by FTC Chair Lena Kahn, who...more
Companies poring over high-stakes investigations and litigation now have immediate access to a powerful new service to assist in identifying and analyzing digital clues from mobile devices through HaystackID’s Mobile Elite...more
We have warned several times of the dangers of using public Wi-Fi networks (e.g., “I Spy Your Wi-Fi” from September 2018 and March 2020). For iPhone users, a newly-detected vulnerability risked serious damage to your phone’s...more
While smart toys can certainly be useful educational tools for children, they also present some potential privacy risks and could invade what is traditionally a private space. Think about it—the thought of your child’s toy...more
Over the last decade, we have heard a lot about artificial intelligence, machine learning, robotics, blockchain, and other disruptive digital technologies and how they are transforming the world. With the current coronavirus...more
Are digital natives, those who were born in an era when electronic devices were prevalent and in their hands from the moment they were old enough to hold them, better equipped in this current era of social and digital media?...more
As we become increasingly reliant upon our phones, we make ourselves more vulnerable to cyberattacks. Indeed, Experian’s 2020 edition of its annual Data Breach Industry Forecast details five predictions for data breach...more
Holiday shopping is in full gear and everything seems to be an Internet of Things (IoT) device. It continues to amaze me how folks will buy IoT gadgets and plop them in their homes and have no idea that they include a speaker...more
Oregon became the latest state to require manufacturers of internet “connected devices” that make, sell or offer to sell the devices in the state to equip the device with “reasonable security features” according to Oregon...more
Connected devices, or what is referred to as the “consumer internet of things” is big business right now. Consumers want to “talk” to their devices throughout their home wherever they are, and some organizations’ business...more
This past September Governor Brown signed into law Senate Bill 327, which is the first state law designed to regulate the security features of Internet of Things (IoT) devices. ...more
In September of this year, with SB 327, California stepped into the vanguard of information age law by passing a cybersecurity regulation on the Internet of Things. SB 327 has added new sections to Cal. Civil Code §1798....more
On September 28, Governor Jerry Brown approved California Senate Bill 327, making California the first state in the country to regulate the security of Internet of Things (IoT) devices. ...more
In August 2017, Disney and three of its software developer vendors were sued in a class action in California in which it was alleged that Disney collected children’s information in violation of the Children's Online Privacy...more
On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more
The Federal Communications Commission and the Obama administration recently adopted several important initiatives to facilitate innovation in and rapid deployment of the nascent Internet of Things (IoT). The FCC identified...more
To say that mobile device usage has reached a tipping point would be an understatement. There are now more mobile devices than people in the world, a staggering 7.9 billion mobile devices for 7.4 billion people on Earth. In...more
Most people don’t think about the microphone on their mobile phone unless it isn’t working. Most people don’t know that if it is on, it is working all of the time and is capturing private data that it has access to....more
Here’s a question: do you review each smart device’s policies and terms before you purchase the device? Probably not. However, when you pick out or receive a smart device, you really need to be aware of the privacy and...more