Summary
Due to the popularity and volume of mobile devices being used throughout the world, they have become common sources of digital evidence in litigation proceedings. Data related to mobile devices can be stored on the device, within a backup stored on a computer, or in a cloud repository. The best source of collection will depend on the specific scope of your matter. It is important to understand the different types of data that can be extracted from mobile devices, mobile device backups, and the cloud.
In this Practice Guide
- Mobile device collection methods
- Mobile device applications
- Questions for mobile device custodians
Key Insights
- Stock and third-party application differences
- Application data collection limitations
- Security and encryption challenges
Practice Guide Download
Click the link below to download the practice guide.
Collecting Data from Mobile Devices and Their Applications (PDF)
About the Author
Other related posts
An Ounce of Prevention: Fundamentals of Data Protection
For legal practitioners, a commitment to data protection is a matter of ethical duty, legal and regulatory compliance, and fundamental responsibility to clients and stakeholders. Fulfilling that commitment requires consideration of security compliance frameworks, role-based access control, cloud storage vs. on-premises storage, and data encryption.
Six Data Protection Strategies for Legal Teams: Mitigating Risk, Maintaining Reputation
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.