Insights2019-12-13T14:49:26-05:00

HOLIDAY JOY: COPING WITH AN INBOX FILLED WITH SCAMS

The holiday season is in full swing, and cybercriminals are working full time to devise the best schemes to fill their stockings with your banking details. It is no longer enough to stay alert for misspellings, typographical errors, fake logos, [...]

Tags: , , , |

PENNSYLVANIA SUPREME COURT RULES DEFENDANT CANNOT BE COMPELLED TO DISCLOSE COMPUTER PASSWORD

Last week, the Pennsylvania Supreme Court ruled that the Fifth Amendment privilege against self-incrimination bars a court from compelling a defendant to provide the password to an encrypted computer. Reversing the Pennsylvania Superior Court in Commonwealth of Pennsylvania v. [...]

LEAVE IT TO THE EXPERTS

On Sunday, September 13, 2015, a 30-year employee of Charter Dura-Bar, Robert O’Rourke, downloaded electronic data containing confidential and trade secret information belonging to Dura-Bar. According to a Law360 article, a disgruntled O’Rourke downloaded 1,900 files in only 20 minutes [...]

BRING YOUR OWN DEVICE (AND RISK): FEATURES AND LIMITATIONS OF MOBILE DEVICE MANAGEMENT

Many companies no longer require employees to use only company owned mobile devices for business purposes. In part because some employees prefer the convenience and efficiency of using their own devices for work activity, many companies have adapted to the [...]

Tags: , , , , , , |

OFFICE 365 CONTENT SEARCH FOR EDISCOVERY: UNDERSTANDING THE NUANCES TO ENSURE DEFENSIBLE RESULTS

Microsoft has made significant strides toward enabling easy searching and collecting of relevant data for eDiscovery purposes. Being able to search mailboxes and SharePoint/OneDrive sites from one straightforward search form – to set up litigation holds, conduct internal investigations, or [...]

EPHEMERAL MESSAGING NOT JUST FOR TEENAGERS AS BUSINESSES CONTINUE TO RECOGNIZE ITS VALUE

Messaging platforms with automatic sunset capabilities - ephemeral apps like Snapchat, Wickr, Signal, Telegram, and Dust – are slowly creeping into the business world. These apps offer end-to-end encryption and automatic deletion after a certain period of time, or even [...]

Tags: , |