Insights 2018-01-29T11:55:47+00:00

COURT-COMPELLED DECRYPTION OF SEIZED SMARTPHONES AND OTHER ELECTRONIC DEVICES

Does the Fifth Amendment privilege against self-incrimination provide grounds for a defendant to refuse to decrypt a smartphone, hard drive or other device which was seized by law enforcement under a valid search warrant?  Recent cases suggest that Fifth Amendment [...]

Tags: |

WHY AREN’T YOU USING TWO-FACTOR AUTHENTICATION?

As more of our daily tasks, purchases, and communications involve being logged into an online service - and as more of our data is at risk of theft and misuse because of it - the level of security required to [...]

TECHNOLOGY ASSISTED REVIEW (TAR 2.0) IN ACTION – ANALYTICS ENABLES ATTORNEYS TO REVIEW THE RELEVANT DOCUMENTS EARLY, IN RAPID RESPONSE TO A GOVERNMENT SUBPOENA

bit-x-bit Uses Analytics to Assist Law Firm’s Rapid Response to Government Subpoena Technology Assisted Review (TAR) is a method of review that uses algorithms and artificial intelligence to identify potentially relevant documents based on reviewer input. As a reviewer identifies [...]

Tags: |

THE SEDONA CONFERENCE ADDRESSES DISPOSITION OF DATA AND SEEKS PUBLIC COMMENT

The Sedona Conference, a non-profit research and educational institute dedicated to the advanced study of law and policy in the areas of antitrust law, complex litigation, and intellectual property rights, now provides guidance on the disposition of physical and electronically [...]

Tags: |

GETTING IP ADDRESSES AND SUBSCRIBER INFORMATION INTO EVIDENCE – NEW PENNSYLVANIA APPELLATE COURT RULING

Lawyers often obtain, through subpoenas, the IP addresses from an internet service provider (“ISP”) in the hope that they will lead to identifying an ISP’s user-subscriber, who allegedly hacked into a web mail account or device.  Once IP addresses are [...]

Tags: |

VERIZON ISSUES ANNUAL DATA BREACH INVESTIGATIONS REPORT

Spring has finally arrived, and once again we look back last year’s security incidents and data breaches.  Verizon recently released its annual Data Breach Investigations Report (“DBIR”) and as always, it is filled with interesting attack patterns, analysis and a [...]

Tags: |