News & Analysis as of

Electronically Stored Information Work Computer

Association of Certified E-Discovery...

How Not to Prevent an Effective Forensics Investigation

For eDiscovery and digital forensics experts, there are some frequently occurring actions we’ve seen that can hamper our ability to perform thorough and effective forensics investigations. This blog is designed to give a...more

Association of Certified E-Discovery...

[Webinar] How to Ensure Departing Employees Don't Turn Into Insider Threats - May 18th, 1:00 pm - 2:00 pm EDT

Offboarding employees after they've resigned or been terminated is largely a routine process; they turn in their devices, which can then be imaged and archived. But are you routinely investigating their computer activity...more

Association of Certified E-Discovery...

Digital Forensics: A Look into Employee Data Theft Investigations

Employee data theft happens frequently, and especially in current times where employees are leaving or being terminated. Some may be due to layoffs while others may leave for personal or other reasons. However, there is...more

Reveal

Deleted ESI Doesn’t Automatically Mean Sanctions: Two Recent Cases Highlight the Spoliation Thresholds in Rule 37(e)

Reveal on

Two Recent Cases Highlight the Spoliation Thresholds in Rule 37(e)  - With the 2015 FRCP amendments quickly nearing a half-decade in existence, case-law continues to define how these rules are upheld in court, especially...more

Proskauer - Minding Your Business

First Department Finds Work-Product Protection Not Waived by Storage of Documents on Company Laptop

On June 6, 2017, the First Department had an opportunity to apply—and reaffirm—last month’s decision in Peerenboom v. Marvel Entm’t, LLC, where the Court held that use of a company email system for personal purposes “does...more

Seyfarth Shaw LLP

California Federal Courts Reiterate: Unless Computer Hacked, Computer Fraud and Abuse Act Permits Misuse Of Electronic Information

Seyfarth Shaw LLP on

In United States v. Nosal, 676 F.3d 854 (9th Cir. 2012) (en banc), the court held that the Computer Fraud and Abuse Act, 18 U.S.C. § 1030, prohibits unlawful access to a computer but not unauthorized use of computerized...more

6 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide