Latest from eDiscovery Today
In U.S. v. Avenatti, New York District Judge Jesse M. Furman, among other rulings, denied without prejudice the defendant’s motion that his WhatsApp communications (with a client he was indicted for a scheme to defraud) should be excluded unless the Government obtains and produces “the original, electronically stored version” of the relevant communications, finding that his arguments about authentication and completeness were “premature”.
This week’s post for IPRO’s blog is my second weekly post in a row promoting an event that relates to trends in eDiscovery and/or information governance! ARMA InfoCon 2021 is next week! And I’m speaking there!
The Average Time to Detect and Contain a Data Breach from January 1 Was Last Week: Cybersecurity Best Practices
As Cybersecurity Awareness Month continues, this recent article from Forensic Discovery notes that your Android mobile device may have already been hacked and you may not even realize it. In fact, it may have been hacked as far back as January 1 and it may have taken until last week – or longer – to detect and contain it.