Insights2018-01-29T11:55:47-05:00

PENNSYLVANIA SUPREME COURT RULES DEFENDANT CANNOT BE COMPELLED TO DISCLOSE COMPUTER PASSWORD

Last week, the Pennsylvania Supreme Court ruled that the Fifth Amendment privilege against self-incrimination bars a court from compelling a defendant to provide the password to an encrypted computer. Reversing the Pennsylvania Superior Court in Commonwealth of Pennsylvania v. [...]

LEAVE IT TO THE EXPERTS

On Sunday, September 13, 2015, a 30-year employee of Charter Dura-Bar, Robert O’Rourke, downloaded electronic data containing confidential and trade secret information belonging to Dura-Bar. According to a Law360 article, a disgruntled O’Rourke downloaded 1,900 files in only 20 minutes [...]

BRING YOUR OWN DEVICE (AND RISK): FEATURES AND LIMITATIONS OF MOBILE DEVICE MANAGEMENT

Many companies no longer require employees to use only company owned mobile devices for business purposes. In part because some employees prefer the convenience and efficiency of using their own devices for work activity, many companies have adapted to the [...]

Tags: , , , , , , |

OFFICE 365 CONTENT SEARCH FOR EDISCOVERY: UNDERSTANDING THE NUANCES TO ENSURE DEFENSIBLE RESULTS

Microsoft has made significant strides toward enabling easy searching and collecting of relevant data for eDiscovery purposes. Being able to search mailboxes and SharePoint/OneDrive sites from one straightforward search form – to set up litigation holds, conduct internal investigations, or [...]

EPHEMERAL MESSAGING NOT JUST FOR TEENAGERS AS BUSINESSES CONTINUE TO RECOGNIZE ITS VALUE

Messaging platforms with automatic sunset capabilities - ephemeral apps like Snapchat, Wickr, Signal, Telegram, and Dust – are slowly creeping into the business world. These apps offer end-to-end encryption and automatic deletion after a certain period of time, or even [...]

Tags: , |

VERIZON ISSUES 12TH ANNUAL DATA BREACH INVESTIGATIONS REPORT

It’s that time again! Verizon recently released its highly anticipated 12th annual Data Breach Investigations Report (“DBIR”), with a valuable data-driven review and analysis of the past year’s major security events. The DBIR is the result of the analysis of [...]