Tagged with: Mobile Device Forensics
Recent eDiscovery Cases for Mobile Phones and Social Media
As we all know, mobile phones and social media applications are storing and retaining more information about their users and their activities than ever. The range of electronically-stored information (ESI) that is fair game in a lawsuit and the case law that governs continues to evolve. Just how much is...
Why it's Crucial to Have a Corporate Mobile Device Policy
The more we rely on mobile devices as vehicles for business communications and entertainment, the more data we create and consume. For every additional bit and byte that is born in the ether, there is a heightened chance that the information will become fodder for eDiscovery. Despite this...
Unique eDiscovery Challenges with Mobile Device Data and How to Solve Them
The core issue in Healthwerks, Inc. v. Stryker Spine, et. al, (Case No. 14-cv-93-pp.) involves alleged breaches of non-compete contracts. However, a "late-filed motion" by Plaintiff to compel additional discovery prompted Honorable US District Judge Pamela Pepper to issue a ruling relating to the after-the-buzzer admissibility of text...
Social Media and Mobile Device Data Collection and Defensibility
With the proliferation of social media and mobile devices in our personal and professional lives, the need to collect ESI from them will only continue to grow. Each presents unique challenges for organizations, as they house different forms of data depending on platform and device type. This webinar identifies and...
4 Things to Consider about iPhone OS for an MDM Policy
As consumer technology continues to infiltrate the corporate working environment, a proper information governance strategy is paramount to ensure that valuable business information is retained while stale data is purged to reduce legal and regulatory risk exposure. Popular mobile devices all have unique operating systems - providing...
Text Messages in eDiscovery: Recovery, Retention, and Preservation
Once an organization maps an inventory of its own unique portfolio of cell phones and tablets, a consistent and repeatable process should be instituted in order to ensure data is properly identified, preserved, and considered for use in internal investigations, regulatory and law enforcement scenarios, and eDiscovery proceedings. This...
5 Cases that Highlight the Challenges of Mobile Device Preservation
This post summarizes five recent judicial experiences littered with examples of litigants grappling with issues of mobile device preservation. As mobile device usage and capabilities increase, the importance of the ever-slimmer gadgets as potential sources of electronically stored information (ESI) becomes undeniable. The more we rely on these accessories as v...
eDiscovery Update: FBI vs. Apple – Thinking Outside the Phone
This post was originally published on The Daily Record. This post explains the privacy controversy between Apple and the FBI and explains Apple’s encryption software and alternative methods to retrieve ESI. Unless you have been living under a rock for the past few weeks you’ve likely heard about the...
3 Methods of Mobile Device Extractions and the Data Each Contains
This post defines logical, filesystem, and physical mobile device extractions, and explains the type of ESI each one retrieves; i.e. deleted vs active data. There are three types of extractions that may be performed on a mobile device: logical, filesystem, and physical. The feasibility of these three types of...
Brady Gets A Pass on a Cellphone That No Longer Exists
This post highlights the decision of the court regarding a pardon granted to NFL player Tom Brady after allegations of deflation resulted in a four game suspension. Today, the Honorable Richard M. Berman (U.S.D.C., S.D.N.Y) vacated the four-game suspension imposed on Tom Brady by...
D4 Weekly eDiscovery Outlook
Power your eDiscovery intellect with our weekly newsletter.
Posted January 18, 2018
5 Expert Predictions for the eDiscovery Industry in 2018
Posted January 17, 2018
Get Your Passport to GDPR Success - LegalTech New York 2018
Posted January 11, 2018
Is Your Organization Vulnerable to a Cyber Attack? 3 Steps to Put Your Mind at Ease
Posted January 04, 2018
How the EU and China Plan to Deal with Multinational Data
Posted December 28, 2017
How to Navigate International Data Privacy Laws for eDiscovery
Posted December 21, 2017
Cross-Border eDiscovery: An Introduction to Cultural and Legal Obstacles
Posted December 14, 2017
Webinar Q&A Featuring Panelists from Special Counsel and Brainspace
Posted November 30, 2017
Help Your Employees Find the Information They Need with Machine Learning
Posted November 22, 2017
How to Use Managed and Prioritized Workflows to Reduce the Cost of Review [On-Demand Webinar]
Posted November 16, 2017
5 Workflow Tips for Conducting a Foreign Language Review