News & Analysis as of

Mobile Devices Discovery Bring Your Own Device (BYOD)

CloudNine

Efficient Text and Chat Data Discovery Starts with Information Governance (IG)

CloudNine on

When it comes to ensuring that data is preserved and available for litigation, investigations, or government inquiries, it all starts with establishing and codifying clear data governance policies and procedures....more

A&O Shearman

Overcoming eDiscovery-related chat data challenges: Part 3: during an investigation

A&O Shearman on

This post provides tips from our eDiscovery experts on the identification and preservation of chat data during an investigation - Chat data will inevitably need to be collected for review if an investigation or dispute...more

A&O Shearman

Overcoming eDiscovery-related chat data challenges: Part 2 - prior to an investigation

A&O Shearman on

This post provides some tips from eDiscovery experts on what to consider ahead of any investigation commencing. Consider ease of compliance when procuring chat software The pandemic accelerated the adoption of chat and...more

Reveal

3 Challenges Corporate Legal Teams Face With BYOD

Reveal on

Today’s eDiscovery Blues comic highlights several challenges In-House legal teams might face when working with data in the face of litigation, starting with the sinking feeling that comes when you ask yourself, “Is the I.T....more

Epiq

BYOD Challenges

Epiq on

If you are like most, you probably have 4-5 different chat applications on your phone to talk to friends and family members.  Dad only likes to text via SMS, brother Peter only uses Facebook Messenger, Aunty Bridgette can...more

Association of Certified E-Discovery...

Hold My Phone: Part 1 – Preservation and Collection of Mobile Device Data

Mobile devices, especially smartphones, have become home to all manner of data about what we do. That means they should be seems as a key potential source of potentially relevant electronically stored information....more

Epiq

Mobile Device Discovery

Epiq on

The importance of mobile device data in legal discovery, investigations, and other proceedings is ubiquitous and virtually indisputable. Mobile devices such as cellphones, smartphones, e-readers, and tablets pose a...more

Epiq

eDiscovery and BYOD

Epiq on

As technology advances, businesses and employees are embracing “bring your own” opportunities beyond “bring your own device,” or BYOD – which refers to when employers allow or even mandate employees to bring their own...more

Polsinelli

New Guidance on Employee-Owned Device Discovery

Polsinelli on

As technology continues to evolve, organizations are increasingly facing challenges concerning whether, and to what extent, they allow employees to utilize their own devices for work purposes. When employees use their own...more

Searcy Denney Scarola Barnhart & Shipley

Do BYOD Corporate Policies Provide an Unfair Protection?

BYOD — Bring Your Own Device - Should defendants be permitted to adopt a policy concerning employee use of personal computing devices in business that benefits the defendant and then hide behind that policy to its benefit...more

Parker Poe Adams & Bernstein LLP

Get Consent to Access Personal Devices Employees Use for Work

By now, most employers are familiar with “Bring Your Own Device to Work” policies. These policies allow employees to access company information through their own computers, smartphones, tablets, etc. ...more

Kilpatrick

BYOD (Bring Your Own Device) Policies and Best Practices

Kilpatrick on

Some of us may remember a time when companies were not as concerned about where their information was maintained, as most of it was kept in some form or fashion in file cabinets or individual desks, or perhaps stored offsite...more

McGuireWoods LLP

E-Discovery Update: When Personal and Work Data Collide

McGuireWoods LLP on

In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more

Butler Snow LLP

The 21st Century Water Cooler: Discovery and Text Messages

Butler Snow LLP on

Text messages, once the exclusive domain of teenagers and college students, are increasingly used in business communications. These communications are, unsurprisingly, also discoverable in a wide variety of litigation...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Troutman Pepper

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately

Troutman Pepper on

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

McManis Faulkner

BYOD: Party Essentials for Corporations and Employees

McManis Faulkner on

The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more

17 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide