News & Analysis as of

Data Security Chain of Custody

U.S. Legal Support

Presenting Digital Evidence in Court

U.S. Legal Support on

With how much of our collective lives are experienced online, a trial that doesn’t include digital evidence may soon be the rare exception. Between the massive collection of data across commercial operations and the...more

K2 Integrity

Information Leaks: How to Assess the Impact, Investigate the Cause, and Reduce the Likelihood of Future Breaches

K2 Integrity on

Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more

Purpose Legal

What is the Chain of Suspicion?

Purpose Legal on

Understanding what is the chain of suspicion in a legal setting is extremely important, especially when it comes to a digital forensic examiner. The chain of custody is suspicion for things like criminal defense work,...more

TransPerfect Legal

Remote Forensic Collection: Considerations for a WFH Strategy

TransPerfect Legal on

TLS experts Jon Langton and Joseph Marra were pleased to be invited as guests on a podcast published by the International Legal Technology Association (ILTA). The episode, “Forensic Collections in a ‘WFH’ World,” features...more

4 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide