This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Even where a court rules that a company does not have possession, custody or control of an employee’s text messages pursuant to its BYOD policy or other factors, those text messages still may be discoverable through a subpoena to the employee directly.
Even where a court rules that a company does not have possession, custody or control of an employee’s text messages pursuant to its BYOD policy or other factors, those text messages still may be discoverable through a subpoena to the employee directly.
And it’s not entirely clear yet whether courts will consistently enforce, as a writing, something as easy to do as click “I agree,” for example. And so, the court held that this was in fact, a likeness, or at least protected by the law that protects against unauthorized use of likenesses.
Electronic signatures (or e-signatures) have become nearly ubiquitous in everyday life and business—from confirming your agreement to terms and conditions on a website, to using e-signature tools to sign a work contract. What is an e-signature? The ESIGN Act supersedes statelaws that may conflict with the act’s provisions.
Data Protection Authority powers: The European Court of Justice (CJEU) has ruled that Data Protection Authorities are not obliged to exercise corrective powers in the event of a breach. If a data breach occurs, businesses may wish to take steps to rectify it and prevent recurrence and maintain a record of its response.
E-discovery professionals are on the front lines of detecting deep fakes used as evidence, according to Marathe. Marathe argues judges and lawyers also need to be heavily educated on the latest developments in deep fake technology in order to counter their use in court. Deepfakes Are Coming to Courts. free registration req.)
E-discovery professionals are on the front lines of detecting deep fakes used as evidence, according to Marathe. Marathe argues judges and lawyers also need to be heavily educated on the latest developments in deep fake technology in order to counter their use in court. Deepfakes Are Coming to Courts. free registration req.)
A CID is a type of Commissioner-authorized subpoena, enforceable in court, that subjects the recipient to a number of formalized processes and timelines. FTC unanimously held that Section 13(b) of the FTCA does not grant the FTC authority to obtain monetary remedies in federal court. 18] In FTC v. Shire ViroPharma, Inc. ,
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content