Remove tag mobile-device
article thumbnail

GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen

The Last Watchdog

It involves regularly changing passwords and inventorying sensitive data. In addition, educating employees about cybersecurity issues can help to reinforce the security-minded culture of the organization and change employee behaviour. Change passwords regularly. The best practice is to change passwords every 90 days.

article thumbnail

Cases I Will Be Covering Today During Litigation Support Day: eDiscovery Case Law

eDiscovery Daily

Are pictures where you are “tagged” discoverable? Fifth Amendment and Passwords: Are mobile device passwords protected by the Fifth Amendment? Mobile Device Discovery and Sanctions: How often are we seeing cases involving spoliation of mobile device data? Hope to see y’all there!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Yesterday, we looked back at cases related to passwords and Fifth Amendment protection, non-party discovery and mobile and messaging. Oh, and a photo on social media can be discoverable simply because you’re “tagged” in it. NY Appeals Court Extends Discoverability of Social Media Photos to “Tagged” Photos : In Vasquez-Santos v.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

And what if that unease was coming from your mobile device. Some of those who bought the spyware were allegedly able to see live locations of the devices, view the targets emails, photos, web browsing history, text messages, video calls, etc. What role does technology play in facilitating intimate partner abuse? It's natural.