Ad Law Tool Kit Show – Episode 12 – Telemarketing and Texting
Recent Trends in TCPA Litigation - The Consumer Finance Podcast
Credit Eco to Go Podcast - The Results are In: Consumers Really Do Respond Better to Digital Communications
CF on Cyber: An Update on the Changes to the Florida Telemarketing Act
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
PODCAST: Williams Mullen's Trending Now: An IP Podcast - Telecommunication Consumer Protection Act (TCPA): Update and Practical Guidance
Discussing the Telephone Consumer Protection Act (TCPA) and the 2020 Election
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Health Tech Podcast - Episode 3: HIPAA, HITECH and TCPA
Mobile devices have fundamentally reshaped how we communicate, work, and live. With 91 percent of Americans owning a smartphone and spending nearly five hours per day on these devices, mobile devices have become integral to...more
For years, litigators focused on emails and corporate documents as the primary sources of discoverable evidence. But the way people communicate has changed. Today, crucial case evidence is just as likely—if not more likely—to...more
New year, new case law! In our January 2025 monthly webinar of cases covered by the eDiscovery Today blog, we will discuss disputes related to whether emojis constitute contract agreement, privilege status of text messages,...more
If you ask most legal professionals about discovery of data from mobile devices, the discussion typically turns to text messages. However, there are several other data types unique to mobile devices that are not only...more
[Editor’s Note: This article was first published August 21, 2024 and EDRM is grateful to Tom Paskowitz and Robert Keeling of our Trusted Partner, Sidley, for permission to republish. The opinions and positions are those of...more
When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more
A recent decision in ediscovery case law, Maziar v. City of Atlanta from June 10, 2024, underscores the crucial importance of early preservation, particularly regarding text messages from mobile devices. This case, presided...more
Modern Musings and Present-Day Pitfalls for Protocols – Things We Didn’t Have to Consider 5 Years Ago - In some ways, the current day challenges with ESI Protocols are the same as they’ve been for years – counsel is...more
The FTC is proposing significant changes to the Children’s Online Privacy Protection Act (COPPA) rule to place new restrictions on the use and disclosure of children’s personal information. The COPPA Rule requires websites...more
The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more
Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more
After collecting, analyzing the volume of data found on devices can be overwhelming. Attorneys and eDiscovery practitioners need the ability to gather insights across a variety of data sources, especially third-party...more
Trent Livingston has been the CEO of ESI Analyst since 2018. Trent started his career as a software test engineer and developer at Microsoft before entering the eDiscovery marketplace in the early 2000s. He has since provided...more
If you are like most, you probably have 4-5 different chat applications on your phone to talk to friends and family members. Dad only likes to text via SMS, brother Peter only uses Facebook Messenger, Aunty Bridgette can...more
Historically focused on manually wading through large volumes of email and electronic documents, e-discovery is transforming in nuanced ways. Discovery of mobile devices, social media and other online applications raises...more
“What can you do to protect personal information when you collect data from a phone?” This is one of the most frequently asked questions of our forensics practice group....more