SlideShare une entreprise Scribd logo
1  sur  1
Six years ago, I.T.’s main source of truth when it came
to legal and compliance rested in email servers. These
days, work communications have evolved and are not
limited to just laptops. They have burst on the scene
with text, instant messaging, and mobile sharing apps.
Where is your data going? Where is it stored?
• Where is the backed-up data stored?
• What are our retention and archival policies?
• How is the company currently backing up the data stored on
laptops, desktops and mobile devices (a.k.a. endpoints)?
• Which devices — Windows, Mac, iOS, Android, Linux, etc. —
are in use?
• How do we manage data belonging to ex-employees?
• How does our existing software handle and implement
data privacy and confidentiality policies?
• Can we collect and preserve deleted messages?
• How can I monitor messaging communications on
mobile devices for adherence to regulatory
mandates or internal compliance policies?
• Give Legal information about the company’s
data assets
• Educate Legal on all the software I.T. uses to
manage data
• Look for opportunities for I.T. to identify and collect
data that can facilitate repeatable collections and
reduce spoilage risk
• Involve Legal early in the process while evaluating
data-protection software that enables eDiscovery
• Enable access to advanced audit capabilities that ensures
full chain of custody
• Choose software that helps Legal do its own data retrieval
Druva is the only company in the data protection space that
enables companies to grab 100% of data off mobile devices.
Learn more at
- Gibson Dunn, “2015 Mid-Year E-Discovery Update”,
http://www.gibsondunn.com/publications/Pages/2015-Mid-Year-E-Discovery-Update.aspx
- RingCentral, “Big changes in business communications”,
https://blog.ringcentral.com/2013/03/infographic-big-changes-in-business-communications/
- Smarsh, “2015 Electronic Communications Compliance Survey Report”
http://www.smarsh.com/whitepapers/2015-electronic-communications-compliance-survey-report
of business users use text
messaging for business
communications. Those text
messages can pose a significant risk.
79%
of those that allowed text
messaging had minimal or
no confidence in their
ability to produce messages if requested.
60%
reason digital
communications data
is leveraged
Outside of audits, litigation and
e-discovery requests are the
#1
GETTING A CLUE:
UNCOVERING THE TRUTH ABOUT YOUR DATA
WITH MOBILE FORENSICS
STANDARD QUESTIONS LEGAL HAS FOR I.T.
DURING DISCOVERY OF DATA:
Enterprise I.T. can play a critical role in creating a plan to address the mobile eDiscovery risks.
WITH MOBILE FORENSICS, I.T. CAN:
Texts and instant messages are increasingly at issue in
investigations and litigation. But extracting them from
mobile devices can be expensive and time consuming,
if possible at all.”
druva.com/proactivecompliance
- Gibson Dunn “2015 Mid-Year E-Discovery Update”
SMS
SMS
SMS
SMS
SMS
SMS
SMS
SMS
SMS
SMS
I think I left my laptop a
tthebardang
it LO
L I had so many important files on
there
There’s a package at my desk
t
hatdidn’thavemynam
e
on
it but I opened it anywa
y.Guess
Se
e
you
at the restaurant at 7:30. Bring your
laptop
w
it
h
you, I want to discuss the
deal
Do you know the password to the NAS drive? Need to access some impo
I’
m
not supposed to say anything but Bob is getting fired for a
Sources:

Contenu connexe

Tendances

C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditing
Dr. Wilfred Lin (Ph.D.)
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres
- Chris - Henry -
 

Tendances (20)

The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
C7 defending the cloud with monitoring and auditing
C7   defending the cloud with monitoring and auditingC7   defending the cloud with monitoring and auditing
C7 defending the cloud with monitoring and auditing
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
 
Protecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the EnterpriseProtecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the Enterprise
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
 
Innovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowresInnovation_chrishenry_FIC_October2015-lowres
Innovation_chrishenry_FIC_October2015-lowres
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Big data security
Big data securityBig data security
Big data security
 
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with IT
 

Similaire à Getting a clue: uncovering the truth about your data with mobile forensics

AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
Angela Sanfilippo
 
MTP for MCA
MTP for MCAMTP for MCA
MTP for MCA
Tushar Rajput
 
white-paper-its-data-qualitys-world-en-na-f01
white-paper-its-data-qualitys-world-en-na-f01white-paper-its-data-qualitys-world-en-na-f01
white-paper-its-data-qualitys-world-en-na-f01
Elizabeth (Liz) Whalen
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
Zohra Razaq
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 

Similaire à Getting a clue: uncovering the truth about your data with mobile forensics (20)

Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
AGILONE-ACADEMY_The-State-of-Big-Customer-Data-2015-FINAL3
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...How your data can be used against you #DataScienceWeek presentation by Leigh-...
How your data can be used against you #DataScienceWeek presentation by Leigh-...
 
Guarding and Growing Personal Data Value
Guarding and Growing Personal Data ValueGuarding and Growing Personal Data Value
Guarding and Growing Personal Data Value
 
MTP for MCA
MTP for MCAMTP for MCA
MTP for MCA
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
white-paper-its-data-qualitys-world-en-na-f01
white-paper-its-data-qualitys-world-en-na-f01white-paper-its-data-qualitys-world-en-na-f01
white-paper-its-data-qualitys-world-en-na-f01
 
How does big data impact you
How does big data impact youHow does big data impact you
How does big data impact you
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
Implementation of application for huge data file transfer
Implementation of application for huge data file transferImplementation of application for huge data file transfer
Implementation of application for huge data file transfer
 

Plus de Druva

Plus de Druva (20)

Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey Druva’s 2017 Ransomware Survey
Druva’s 2017 Ransomware Survey
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Rethink Server Backup and Regain Control
Rethink Server Backup and Regain ControlRethink Server Backup and Regain Control
Rethink Server Backup and Regain Control
 
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
 
20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva20 point checklist : why move backup and disaster recovery to the cloud - druva
20 point checklist : why move backup and disaster recovery to the cloud - druva
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Black Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data SprawlBlack Hat 2015 Survey: The Challenge of Data Sprawl
Black Hat 2015 Survey: The Challenge of Data Sprawl
 
Soundbytes from the Frontlines
Soundbytes from the FrontlinesSoundbytes from the Frontlines
Soundbytes from the Frontlines
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
AWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWSAWS reInvent: Building an enterprise class backup and archival solution on AWS
AWS reInvent: Building an enterprise class backup and archival solution on AWS
 
Why You Need Enterprise Backup
Why You Need Enterprise BackupWhy You Need Enterprise Backup
Why You Need Enterprise Backup
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival Guide
 
40 scary stats about data at risk
40 scary stats about data at risk40 scary stats about data at risk
40 scary stats about data at risk
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
 
inSync Cloud FAQ
inSync Cloud FAQinSync Cloud FAQ
inSync Cloud FAQ
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)The Challenges of Windows XP Migration (infographic)
The Challenges of Windows XP Migration (infographic)
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Getting a clue: uncovering the truth about your data with mobile forensics

  • 1. Six years ago, I.T.’s main source of truth when it came to legal and compliance rested in email servers. These days, work communications have evolved and are not limited to just laptops. They have burst on the scene with text, instant messaging, and mobile sharing apps. Where is your data going? Where is it stored? • Where is the backed-up data stored? • What are our retention and archival policies? • How is the company currently backing up the data stored on laptops, desktops and mobile devices (a.k.a. endpoints)? • Which devices — Windows, Mac, iOS, Android, Linux, etc. — are in use? • How do we manage data belonging to ex-employees? • How does our existing software handle and implement data privacy and confidentiality policies? • Can we collect and preserve deleted messages? • How can I monitor messaging communications on mobile devices for adherence to regulatory mandates or internal compliance policies? • Give Legal information about the company’s data assets • Educate Legal on all the software I.T. uses to manage data • Look for opportunities for I.T. to identify and collect data that can facilitate repeatable collections and reduce spoilage risk • Involve Legal early in the process while evaluating data-protection software that enables eDiscovery • Enable access to advanced audit capabilities that ensures full chain of custody • Choose software that helps Legal do its own data retrieval Druva is the only company in the data protection space that enables companies to grab 100% of data off mobile devices. Learn more at - Gibson Dunn, “2015 Mid-Year E-Discovery Update”, http://www.gibsondunn.com/publications/Pages/2015-Mid-Year-E-Discovery-Update.aspx - RingCentral, “Big changes in business communications”, https://blog.ringcentral.com/2013/03/infographic-big-changes-in-business-communications/ - Smarsh, “2015 Electronic Communications Compliance Survey Report” http://www.smarsh.com/whitepapers/2015-electronic-communications-compliance-survey-report of business users use text messaging for business communications. Those text messages can pose a significant risk. 79% of those that allowed text messaging had minimal or no confidence in their ability to produce messages if requested. 60% reason digital communications data is leveraged Outside of audits, litigation and e-discovery requests are the #1 GETTING A CLUE: UNCOVERING THE TRUTH ABOUT YOUR DATA WITH MOBILE FORENSICS STANDARD QUESTIONS LEGAL HAS FOR I.T. DURING DISCOVERY OF DATA: Enterprise I.T. can play a critical role in creating a plan to address the mobile eDiscovery risks. WITH MOBILE FORENSICS, I.T. CAN: Texts and instant messages are increasingly at issue in investigations and litigation. But extracting them from mobile devices can be expensive and time consuming, if possible at all.” druva.com/proactivecompliance - Gibson Dunn “2015 Mid-Year E-Discovery Update” SMS SMS SMS SMS SMS SMS SMS SMS SMS SMS I think I left my laptop a tthebardang it LO L I had so many important files on there There’s a package at my desk t hatdidn’thavemynam e on it but I opened it anywa y.Guess Se e you at the restaurant at 7:30. Bring your laptop w it h you, I want to discuss the deal Do you know the password to the NAS drive? Need to access some impo I’ m not supposed to say anything but Bob is getting fired for a Sources: