Insights2020-05-19T12:04:21-04:00

OBTAINING ENCRYPTED APPLE DEVICE BACKUP DATA FOR INVESTIGATIONS OR LITIGATION

iPhone, iPad and iPod touch users have many ways of keeping their data within reach and accessible. Most commonly, users copy and save data and information from their devices by creating a backup.  This is typically performed when transferring current [...]

Tags: |

THE IMPACT OF SCATTERED AND DYNAMIC SLACK DATA ON ESI COLLECTION AND PRESERVATION

Employees and teams have used Slack for interoffice communication and IT to fly “under the radar” at work since its inception in August 2013.  Slack, an instant messaging and group messaging platform, now has more than 12 million users.  Today, [...]

HOLIDAY JOY: COPING WITH AN INBOX FILLED WITH SCAMS

The holiday season is in full swing, and cybercriminals are working full time to devise the best schemes to fill their stockings with your banking details. It is no longer enough to stay alert for misspellings, typographical errors, fake logos, [...]

Tags: , , , |

PENNSYLVANIA SUPREME COURT RULES DEFENDANT CANNOT BE COMPELLED TO DISCLOSE COMPUTER PASSWORD

Last week, the Pennsylvania Supreme Court ruled that the Fifth Amendment privilege against self-incrimination bars a court from compelling a defendant to provide the password to an encrypted computer. Reversing the Pennsylvania Superior Court in Commonwealth of Pennsylvania v. [...]

LEAVE IT TO THE EXPERTS

On Sunday, September 13, 2015, a 30-year employee of Charter Dura-Bar, Robert O’Rourke, downloaded electronic data containing confidential and trade secret information belonging to Dura-Bar. According to a Law360 article, a disgruntled O’Rourke downloaded 1,900 files in only 20 minutes [...]

BRING YOUR OWN DEVICE (AND RISK): FEATURES AND LIMITATIONS OF MOBILE DEVICE MANAGEMENT

Many companies no longer require employees to use only company owned mobile devices for business purposes. In part because some employees prefer the convenience and efficiency of using their own devices for work activity, many companies have adapted to the [...]

Tags: , , , , , , |

 

Go to Top