Remove Court Remove e-records Remove State law
article thumbnail

Court Declines To Compel Employer To Produce Data from Employees’ Personal Mobile Devices

Discovery Advocate

Even where a court rules that a company does not have possession, custody or control of an employee’s text messages pursuant to its BYOD policy or other factors, those text messages still may be discoverable through a subpoena to the employee directly.

Court 52
article thumbnail

Court Declines To Compel Employer To Produce Data from Employees’ Personal Mobile Devices

Discovery Advocate

Even where a court rules that a company does not have possession, custody or control of an employee’s text messages pursuant to its BYOD policy or other factors, those text messages still may be discoverable through a subpoena to the employee directly.

Court 52
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Berkeley Technology Law Journal Podcast: Regulating IP in the Metaverse with Professor Molly Van Houweling

Berkley Technology Law Journal

And it’s not entirely clear yet whether courts will consistently enforce, as a writing, something as easy to do as click “I agree,” for example. And so, the court held that this was in fact, a likeness, or at least protected by the law that protects against unauthorized use of likenesses.

article thumbnail

Are Electronic Signatures Legal?

Clio

Electronic signatures (or e-signatures) have become nearly ubiquitous in everyday life and business—from confirming your agreement to terms and conditions on a website, to using e-signature tools to sign a work contract. What is an e-signature? The ESIGN Act supersedes state laws that may conflict with the act’s provisions.

e-records 102
article thumbnail

European Data Protection Roundup – Q4 2024

Debevoise Data Blog

Data Protection Authority powers: The European Court of Justice (CJEU) has ruled that Data Protection Authorities are not obliged to exercise corrective powers in the event of a breach. If a data breach occurs, businesses may wish to take steps to rectify it and prevent recurrence and maintain a record of its response.

article thumbnail

The Rise of “Post-Truth” Litigation: ALM’s Isha Marathe on How Deep Fakes Threaten the Legal System (TGIR Ep. 209)

3 Geeks and a Law Blog

E-discovery professionals are on the front lines of detecting deep fakes used as evidence, according to Marathe. Marathe argues judges and lawyers also need to be heavily educated on the latest developments in deep fake technology in order to counter their use in court. Deepfakes Are Coming to Courts. free registration req.)

Litigator 147
article thumbnail

The Rise of “Post-Truth” Litigation: ALM’s Isha Marathe on How Deep Fakes Threaten the Legal System (TGIR Ep. 209)

Legal Tech Monitor

E-discovery professionals are on the front lines of detecting deep fakes used as evidence, according to Marathe. Marathe argues judges and lawyers also need to be heavily educated on the latest developments in deep fake technology in order to counter their use in court. Deepfakes Are Coming to Courts. free registration req.)