shutterstock_594829253As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Supreet Singh, a senior consultant at iDiscovery Solutions, Inc. 

It’s hard to believe the first smartphone was released over 20 years ago. At that time, few thought it would become such an integral part of our lives. Additionally, this year marks the 10th anniversary of the iPhone and its introduction altered the world of digital forensics. Smartphones contain a wealth of personal and sensitive information like passwords, security or access codes, account numbers, electronic communications, and much more. But they are more than mere containers of data. Between the operating system, installed applications, and service providers, there’s a wealth of information that can provide dramatic insight into conversations, activities, habits, preferences, and movements of the phone’s user.

There are essentially three places where smartphone related data can be found: on the phone itself, with mobile app providers (e.g. Facebook, Snapchat, or Yelp), and with the service provider (e.g. AT&T or Verizon). Data from all three sources can be very useful in civil lawsuits, criminal cases, or internal investigations, depending on the needs of the case.
Continue Reading The Smartphone: A Treasure Trove of Evidence in Trade Secret Cases

shutterstock_437170435As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Charlie Platt, a director at iDiscovery Solutions and a Certified Ethical Hacker. He advises clients on data analytics, digital forensics, and cybersecurity.

These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ, NIDS, TLS, SS7 – I’ll stop. I could go on, but you get the idea. And I have a vested interest in keeping your attention.

Acronyms and geek-speak abound, and we are ever on the lookout for the next latest and greatest technical solution to secure our digital assets. Unfortunately, that perfect technical solution doesn’t exist and never will. How can I be so sure? Because no matter how well built, or how well thought out our technical solution may be, humans are involved. When humans are involved, they will be the weakest link, and we can’t (yet) re-engineer humans with a technical solution.
Continue Reading Technically Speaking, Cybersecurity Isn’t About Speaking Technically

shutterstock_617698010As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Charlie Platt, a director at iDiscovery Solutions and a Certified Ethical Hacker. He advises clients on data analytics, digital forensics, and cybersecurity.

At the airport recently, waiting for boarding, flipping through an issue of United States Cybersecurity Magazine, an article about detecting insider threats caught my eye. It was loosely based on a list of behaviors it claimed were ideal indicators for detecting insider threats. I thought, “Wow, this is great! I know plenty of clients who could benefit from this information.” Insider threats are difficult to detect, and I was excited by the opportunity to get new insight, but I became more and more distraught as I read on. The longer I read, the more I saw myself, and many of my cyber-colleagues, being described by the author’s so-called threat indicators. How could we, the good guys, be mistaken for threats?

I read through the list again, and for each point, I asked, “Is this a reliable indicator of a real threat, or a false positive?” I’ve provided the entire list below with my thoughts on each item.
Continue Reading Great Employee or Insider Threat?

shutterstock_281616815

As a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Jeremy Morton, an English solicitor who advises in the areas of intellectual property and data protection law. 

As reported recently by Seyfarth Shaw’s lawyers in this very blog, on 13 April the European Parliament will vote on the EU Commission’s
Continue Reading Hidden Details: Thoughts on Trade Secrets From the UK

IP LifecycleAs a special feature of our blog—special guest postings by experts, clients, and other professionals—please enjoy this blog entry from Stroz Friedberg, a global leader of cybersecurity, investigations and risk management. The firm recently launched Strategic Intellectual Property Protection Services (SIPPS), an offering Stroz Friedberg designed to help companies best handle intellectual property throughout its lifecycle.

-Robert Milligan, Editor of
Continue Reading Protecting Intellectual Property Throughout Its Lifecycle

theifOn the evening of November 17th, Brooklyn Law School’s Trade Secrets Institute will be hosting its annual Symposium at the Law School. This year’s Symposium is titled “Protecting Trade Secrets in a World of Cybercrime” and will feature state and federal prosecutors, private practitioners as well as cybersecurity experts. The evening event will begin with a panel discussing the investigation
Continue Reading Protecting Trade Secrets in a World of Cybercrime

PamelaPassman CREATe.org smAs a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry by Pamela Passman, President and CEO for the Center for Responsible Enterprise and Trade (CREATe.org)

-Robert Milligan, Editor of Trading Secrets

By Pamela Passman

Regional and national laws are increasingly focusing on the specific steps that companies
Continue Reading Trade Secret Protection: What are Reasonable Steps?

As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry by Bartosz Sujecki, an attorney from Bavelaar Advocaten in the Netherlands, on the European Commission’s proposed Directive to provide harmonized trade secret protections in Europe.

-Robert Milligan, Editor of Trading Secrets

By Bartosz Sujecki

The protection of trade secrets
Continue Reading Proposed New Rules on Trade Secrets in Europe – the European Commission Proposal on the Protection of Know-How

As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog post by digital forensics expert Trent Livingston, a Director of iDiscovery Solutions.

By Trent Livingston

Do you recall the early days of the spy movie genre? Many of these movies depicted cloaked secret agents slinking around dark offices snapping
Continue Reading Today’s Connected Employee: A License to Steal

As a special feature of our blog –special guest postings by experts, clients, and other professionals –please enjoy this blog entry on mediation of trade secret cases by mediator Erica Bristol, Principal of EB Resolution Services.

-Robert Milligan, Editor of Trading Secrets

By Erica Bristol

Trade secret litigation often involves deep levels of distrust, heated emotional exchanges, suspicion and anger
Continue Reading Trade Secret Mediation: Advice from a Mediator’s Perspective