Digital Planning Podcast - Interview With Leeza Garber
Compliance into the Weeds-Episode 39, Disclosure of Ransomware Attacks
Your Cyber Minute: Compliance with the Proposed NYDFS Cybersecurity Regulation
Safeguards against Data Security Breaches (Part One)
Join Us for eDiscovery Convergence 2024! This event is proudly hosted by the Ontario Digital Evidence and eDiscovery Working Group (DEED) and the Toronto Chapters of The Association of Certified eDiscovery Specialists...more
There is no doubt that mobile devices have become a constant in our daily lives. We take them everywhere and we can’t seem to live without them, even for a few short hours. In fact, you may be reading this very blog on your...more
With mobile devices being the epicenter of communication and data generation, successfully navigating a digital investigation hinges on your ability to handle the proliferation of this data. However, forensic investigators...more
The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more
The digital landscape is constantly evolving, and with it, the challenges faced by digital forensics and eDiscovery collections professionals. Join our expert panel as they discuss targeted remote collections for iOS and...more
Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more
Crosmun v. The Trustees of Fayetteville Technical Community College Provides Much Needed Guidance to NC Courts on How to Properly Craft eDiscovery Protocols - The Court of Appeals decision in Crosmun is important because...more
In divorce and family law litigation, text, email and cell phone records are often important. In many cases, parties seek this evidence in discovery when it bears on relevant issues. Text, email and cell phone records can...more
In Part 1 of our series on mobile devices, we discussed preserving and collecting mobile device data. In this article, we turn to the types of information you can expect to encounter with mobile devices and key considerations...more