Judge Xavier Rodriguez on Possession, Custody, or Control from the Meet and Confer Podcast
Daily Compliance News: July 24, 2025, The In Phone Hell Edition
Key Discovery Points: Get Your Copy of the 2025 eDiscovery State of the Industry Report
eDiscovery Needs Digital Forensics for a Mobile World
What's the Tea in L&E? Employee Devices: What is #NSFW?
Podcast - Navigating the TikTok Ban: Implications for Government Contractors
[Podcast] TikTok off the Clock: Navigating the TikTok Ban on Devices for Government Contractors
Does Your Company Personal Device Policy Comply with DOJ Guidance?
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Sitting with the C-Suite: Best Practices in Mobile Device Data Preservation
Sitting with the C-Suite: How Do Corporations Manage the Convergence of Data during Remote Work?
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Digital Workplace Issues
Video | Tips for Managing the Preservation of Mobile Device Data
Podcast: Keeping Up with Recent Changes and Trends in Private Fund Regulation
Ron Camhi Discusses the Importance of Mobile Advertising
Celina Kirchner Discusses Social Media Advertising Laws
BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately
New Jersey to consider allowing police to search cell phones to combat distracted driving
Unique Privacy Concerns for Mobile Apps
New satellite services are in development which will permit satellites to communicate directly with unmodified end user phones. These services fall into a category of satellite services known as direct to device services, or...more
Consumers use cell phone numbers to authenticate their identities across a variety of accounts, such as those held with wireless providers, financial institutions, healthcare providers, and retail websites. One common example...more
The Companies (Jersey) Law 1991 (the "Law") permits the creation of cell companies and sets out the legal requirements relating to cell companies in Jersey. In essence, cell companies are companies whose assets and...more
A cancellation clause in a signed mobile phone supply contract was considered unduly onerous and not fairly and reasonably drawn to the purchaser’s attention to be incorporated by reference. ...more
We have noted before how important it is to update the operating system (OS) on your mobile phone as soon as you receive notice from the manufacturer. This week, Apple issued an update to the iOS that is considered urgent....more
The Electronic Frontier Foundation (EFF) (www.eff.org) is a wonderful resource for privacy-related issues and concerns. I check its website frequently to make sure I am aware of the latest issues and concerns around privacy....more
On 13 January 2020 the Turin Court of Appeals dismissed the appeal filed by the National Insurance Provider ("INAIL") and upheld the first instance decision issued by the Court of Ivrea in 2017, which had established...more
Employees seem permanently attached to their smart phones today, but allowing employees to use their personal devices to make work calls, and send and receive work emails can carry substantial risks. ...more
I am speaking at a conference in one of my favorite cities (okay, it’s Chicago) and I was having dinner at the bar when the patron next to me asked me what I do for a living. ...more
There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more
If you have an online account, you are familiar with the username/password method of user authentication. If you have been paying attention to recent news stories, however, you also recognize that this method of...more
In this hoganlovells.com interview, Hogan Lovells partner Trey Hanbury talks about the need for wireless carriers to broaden their offerings to meet the demands of an increasing number of niche markets. At the same time,...more
You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more
University of Michigan researchers have discovered that hundreds of applications in Google Play turn Android phones into a server that allow the user to connect the phone directly to a PC and leave open insecure ports...more
Mexico's Telecom and Antitrust Federal Courts have issued three resolutions declaring that the model used by the Comisión Federal de Telecomunicaciones (COFETEL) for calculating interconnection costs for fixed and mobile...more
The Ninth Circuit issued two similar opinions arising out of Samsung’s appeals of orders denying arbitration in two putative class actions filed against it. The claims against Samsung allege that the smartphone maker...more
The Indianapolis Colts mobile app is alleged by a putative class to record fans’ private conversations. In the putative class action, the named plaintiff alleges that the mobile app secretly activates the smart phone’s...more
Many firms have strict international travel policies in relation to the use of technology. These policies tend to be more skewed towards countries with greater state control over communications networks and specifically the...more
Although the California Legislature sent Governor Jerry Brown bills on bed bugs, powdered alcohol, and making denim the official state fabric, the laws enacted in 2016 affecting the state’s private-sector employers were...more
Last week, the FCC finally released the full, 224-page text of its controversial and anxiously awaited Lifeline Modernization Order, which was approved by a bitterly divided, party-line 3-2 vote on March 31. As we advised in...more
I am pretty up to date on data privacy and security and technology, but the 60 Minutes episode this past Sunday night floored even me. If you didn’t see it, it is worth streaming. Basically, 60 Minutes showed Karsten...more
The U.S. Court of Appeals for the Third Circuit recently became the first federal appellate court to apply the Federal Communications Commission’s declaratory ruling that expanded the notion of what constitutes an...more
It is being reported that 95% of all Android smartphones are vulnerable to being hacked with a text message, which is being called the “heartbleed for mobile.” According to security experts, the vulnerability exploits the...more
We previously reported that government access to cellphone geographic information or CSLI without a warrant has become a vigorous debate between the government, defense attorneys, and the federal bench. In a lengthy opinion,...more
Most of us are aware of the increased risk of identity theft caused by the exponential growth of digital communications. But have we stopped to consider how the ease of communication we have today has significantly decreased...more