Home »
Blog

ModeOne and Complete Legal Partnership Success Story: Remote Mobile Phone Data Collection from Six Workers in One Day
A Complete Legal client recently called with a request to collect data from the cell phones of six custodians who worked in the field at multiple locations across the metro area. To perform this service using traditional forensics tools and processes, a forensics...

Smartphones Contain a Treasure Trove of Data for Litigation, Compliance, and Investigation Purposes
A version of this article first appeared September 15th, 2023, on JD Supra. In today’s digital age, mobile devices have become an integral part of our business and personal lives, and they more and more play a crucial role in legal hold, corporate governance, and...

Mississippi State Agency Blows the Whistle on Brett Favre’s Failure to Disclose Text Messages
By Jason Purviance, Chief Information Officer Discovering text messages on smartphones is a standard part of civil and criminal litigation for the parties to secure evidence supporting their trial strategy. In a case involving a scheme to divert federal welfare money...

SEC Fines Wall Street Firms $289M for ‘Off-Channel’ Recordkeeping
The Securities and Exchange Commission charged 11 Wall Street firms with failures to maintain and preserve electronic communications. The firms, including Wells Fargo Securities ($125M) and BNP Paribas Securities ($38M), admitted the facts and acknowledged that their...

Picture Perfect Deception: Deepfake Images’ Impact on Mobile Device Discovery
A version of this article first appeared July 28th, 2023, on JD Supra. Deepfake images stored on cell phones can have significant implications for eDiscovery. Let’s examine some ways in which they may impact litigation, corporate compliance, and investigation...

Departing Employees and BYOD Risk Mitigation
Companies continue to adopt Bring Your Own Device (BYOD) policies to save money and relieve employees of the “two-phone burden.” However, such policies come with clear risks. Companies must remain particularly concerned when an employee exits the company. What are the primary challenges associated with departing employees in a BYOD policy, and what steps should an employer take to mitigate those risks?