Go to Top

Tag Archives

Tag Archives: Employees

Mobile Discovery: Outsmarting the Smartphone

Smartphones are ubiquitous Six billion smartphones will be in circulation by the year 2020. These phones and other mobile devices can leave behind an indisputable digital trail, and the electronically stored information (ESI) on them can often be relevant, unique, and discoverable. Many employees freely admit sending confidential company information with their mobile device. Is this important source of ESI part of your eDiscovery/investigative strategy? JOIN THE EXPERTS AT 4DISCOVERY FOR …Read More

Join us in Indianapolis for a special Trade Secret Protection CLE event

Want to learn how to help your clients protect their trade secrets? JOIN US FOR A VERY SPECIAL CLE EVENT: Trade Secret Protection – Using Technology to Safeguard Your Most Valuable Assets When? Wednesday, February 7, 2018 Where? The Columbia Club, Capehart / Riley / Steel Room, 121 Monument Circle, Indianapolis, IN, 46204 5:00PM: Gathering, Networking, Cocktails & Hors d’oeuvres 5:30-6:30PM: CLE Presentation, Q&A ATTENDEES ARE ELIGIBLE FOR ONE GENERAL CLE …Read More

Join us for a very special CLE presentation on Trade Secret Protection

CONSIDER THE STATISTICS Trade secret theft is at an all-time high. Businesses of all sizes face serious risks to their bottom line, competitive position, and even survival. Lawyers face an increasingly complex landscape when it comes to counseling their clients on trade secret protection in our digital world. Up to $480 billion in business losses were attributed to trade secret misappropriation last year 50% of employees that left their jobs in …Read More

Shocking Survey Reveals Only 31% of Organizations are Prepared for a Trade Secret Misappropriation

Baker McKenzie Survey Exposes Board-Level Risks that Companies are NOT Prepared For[1] The scenario Your client’s IT Director tells his boss that he has observed suspicious behavior on the company’s network. It seems a senior software code designer for the high-speed securities trading company is downloading massive volumes of proprietary trading software code and copying it to a CD burner. Not good. The employee has recently complained about the strategic …Read More

Cyberbullying Tragedy: A School District’s Obligations for Capturing Digital Evidence

A Case Study A young student has had enough. After months of relentless and cruel cyberbullying and internet harassment, the girl, in a moment of despondency and depression, ends her life. In the unthinkably sad aftermath, parents, teachers, and loved ones wonder what could have been done to prevent this senseless nightmare. Teachers and middle school administrators are accused, in a lawsuit filed by the dead girl’s parents, of missing …Read More

Ransomware Attack Destroys Years of Police Department Evidence

Are your clients prepared for a ransomware attack? The Background Imagine this scenario…you are a police detective. Early one morning you attempt to access your department’s database as you are working on a very important investigation. When you log in to your computer, you are greeted with a gut-wrenching message: “Your files have been encrypted. Make a Bitcoin payment to unlock your files”. This is the start of a very …Read More

W-2 Fraud: Are Your Clients Prepared for a W-2 “Phishing” Attack?

Tax Season Creates a Spike in These Catastrophic Incidents The Background Your HR Director walks into your office: her face ashen, her voice trembling. Earlier that day, she received an email from the company CFO asking her to email all employee W-2 forms to him. In her typical efficient manner, she complied immediately. The email from the CFO, however, was a phony. It was a “spoof” email sent from a …Read More

Phishing Update: The Bad Guys Are Getting More Sophisticated – And Losses Are Way Up

More Bad News…Your Loss From Phishing Fraud May Not Be Covered By Insurance Phishing scams are not new, but losses from these social engineering ploys are increasing dramatically as the fraudsters become more convincing in their techniques.  Indeed, this was one of the primary themes of this year’s Net Diligence Cyber Insurance conference in Santa Monica, California. It’s Getting Ugly Out There… The FBI estimates phishing attacks have cost organizations …Read More

Retweet Case Raises Free Speech Debate

Can a person be held criminally responsible for “Retweeting” another person’s content, or is such communication protected under The First Amendment’s “Free Speech” language? Communication in our electronic world is bending a number of legal concepts into strange new shapes. Consider Safya Roe Yassin, a 39-year-old citizen that was recently arrested for conspiracy and transmitting threats over state lines.  Her alleged crime?  Retweeting twitter posts from a third party that …Read More

An Executive Resigns: Misconduct Suspected, Employer Cannot Access Evidence on His Mobile Phone

“Sorry…You Are Locked Out of Your Own Data” Well, it happened again today.  We had to call a client and advise them that it will be nearly impossible, or at least very expensive to perform a forensic exam of one of their smart phones after the user of the phone, a key executive suspected of misconduct, abruptly resigned.  Why?  Because the device, a newer Apple iPhone, was password protected and …Read More