Due to the popularity and volume of mobile devices being used throughout the world, they have become common sources of digital evidence in litigation proceedings. Data related to mobile devices can be stored on the device, within a backup stored on a computer, or in a cloud repository. The best source of collection will depend on the specific scope of your matter. It is important to understand the different types of data that can be extracted from mobile devices, mobile device backups, and the cloud.
In this Practice Guide
- Mobile device collection methods
- Mobile device applications
- Questions for mobile device custodians
- Stock and third-party application differences
- Application data collection limitations
- Security and encryption challenges
Practice Guide Download
Other related posts
ED102 – In the Beginning: Identification and Preservation Fundamentals
Identification and preservation are the first and most fundamental phases of an electronic discovery effort. The duty of (identification and) preservation is a foundational concept in our legal system that grows out of the common law concept of “spoliation,” which is nearly 300 years old.
ED105 – Clearing the Fog of War: ECA Fundamentals
The fog of war is apt shorthand for the state of uncertainty that exists early in a new legal matter: What are the facts? What are the risks? What evidence exists, and what does it show? Early case assessment (ECA) is how we start to answer those questions.