No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Compliance

Data on the Move: The Evolution of Mobile Tech and Compliance

by Michael Barba
May 12, 2014
in Compliance
Data on the Move: The Evolution of Mobile Tech and Compliance

with contributing author Makenzie Windfelder, Associate at McCarter & English Attorneys at Law

Now that computers and the Internet are a regular part of our daily lives, the digital world increasingly contains potential evidence for all types of activity ranging from individual criminal actions to activity that may be relevant to a business litigation or investigation. Forensic investigations seek to uncover this evidence and then perform analysis in order to gain a full understanding of an end user’s activity on a given computing device. In recent years, traditional computer forensics, or “dead-box analysis,” has begun transitioning into “live-box analysis,” meaning more analyses are performed on volatile systems, such as live computer work stations and mobile devices like laptops, tablets and smartphones. Given the growing use of these mobile technologies for professional purposes, understanding the nuances of preserving, extracting and analyzing electronically stored information (ESI) from them is paramount to the success of any such investigation. Additionally, the policies established by the organization and its legal team to protect that data will be critical in defending this recovery moving forward.

Preservation

Since 2012, more than 1,600 new mobile device types have been released into the marketplace.1 While this flood of new products provides variety for consumers, it also allows for vast differences in the technologies that are capturing potentially critical data. Thus, the first line of business in a forensic investigation is finding the appropriate hardware and software to use during preservation. Hardware considerations may include types of connection interfaces that each of the various phone models require, while software considerations must be made based on the operating system of the phone. For example, BlackLight software from Blackbag Technologies is excellent for the preservation and analysis of Apple products (iPhones, iPads and even Apple computers) but cannot be used on phones that support non-Apple operating systems, such as Android packages. It’s also important to keep in mind that some mobile devices may require multiple tools in order to maximize data extraction.

ESI Extraction

ESI varies by mobile device, thus the challenge in collecting data is the different levels of security each “smart” device employs. For many smartphones, data collections will produce contacts, call logs, text messages and sometimes voicemails and email. Apple devices, however, do not necessarily yield the same information.

Recently, publications have outlined what forensic practitioners can and cannot extract from the various versions of Apple products. For example, prior to the release of the iPhone 4S and iPad 2, a full forensic image of these devices would have provided resident data from the systems, as well as data that may have been purposefully or inadvertently deleted. For next-generation versions of these products, however, deleted data, which resides within the device’s “free space,” can no longer be recovered due to an encryption applied by Apple. This has proved insurmountable for practitioners and, at this point, only Apple can provide encryption keys or crack passwords to break through.  As a result, the company is currently dealing with a backlog of requests from law enforcement agencies to do so.2

Analysis

Given the thousands of makes and models of mobile devices in the marketplace today, proper investigation by experienced forensic examiners employing various software packages is the best bet for maximizing results and producing accurate, reliable analyses. Examiners should be able to identify the key pieces of data that could ultimately prove critical to a case.

For example, location data, such as GPS coordinates and “GeoTags” (geographical metadata within photographs or videos), has become quite important to many investigations. Proper analysis of location information could be essential when investigating where a particular document originated or where a particular event took place. In a recent homicide investigation, GPS coordinates from the victim’s iPhone identified his location just before the time of his death, which was ultimately crucial in identifying the perpetrator.

BYOD Policies

Recently, bring your own device (BYOD) policies, which allow employees to bring their personal mobile devices into the office to access internal data and company information, have gained popularity and are also having a major effect on the analysis of data. While this may allow corporations to initially save money by not having to issue employees company-owned devices, it also provides for a less streamlined computing environment, which can lead to issues, including spoliation, when discovery requirements arise.

Ensuring Defensive Discovery

Corporations must be proactive in addressing the myriad challenges BYOD presents. A corporation that takes a wait-and-see approach to managing and preserving relevant information – including that which resides on mobile devices – may quickly find itself defending against costly spoliation sanctions. 

Permitting BYOD does not mean a corporation is required to support every device on the market. When implementing a BYOD policy, a corporation should identify the devices and operating systems it will support in order to understand the preservation and collection challenges each poses. A corporation may consider requiring employees to register their personal devices with a mobile device management (MDM) solution that, in addition to a variety of enhanced security measures, enables remote access for data collection. Regardless of the parameters of BYOD, the policy should require that employees seeking to use a personal device for work consent to collection of any information stored therein.

Legal Hold Notices should also be used to explicitly direct employees to preserve all information on their mobile devices subject to Legal Hold, highlighting the sources of information unique to these devices such as SMS text messages, call logs, pictures, videos, documents and applications beyond those approved by the corporation. In addition, counsel should ensure that custodial interview questionnaires include targeted questions about the scope of the employee’s use of mobile devices for business purposes, as well as identification of information on one’s device that is subject to Legal Hold. This information will help inform decisions regarding preservation and extraction of potentially relevant data.

Given the proliferation of mobile device use both personally and professionally, corporations should expect that discovery requests will include production of mobile device data. Therefore, careful planning on behalf of general counsel, internal legal teams and supporting forensic practitioners to address and manage preservation, collection and analysis of mobile device data is critical to the success of discovery in any investigation or litigation.


1 http://www.dfinews.com/articles/2013/02/6-persistent-challenges-smartphone-forensics

2 http://www.net-security.org/article.php?id=1932&p=1


Previous Post

Protecting Yourself Against Data Breach: Don’t Be a Target

Next Post

Improving Compliance with Data Science

Michael Barba

Michael Barba

Michael Barba headshot 5-12-14Michael Barba is a Managing Director in BDO Consulting’s Forensic Technology Services group with more than 20 years of experience managing complex and high-profile investigations involving high-tech crime, misconduct and network security incident response. Mr. Barba leads BDO’s Computer Forensics and Incident Response practices in conducting domestic and international investigations affecting the computer networks, resources and intellectual property of numerous Fortune 500 organizations. He assists clients in responding to litigation or an investigation by conducting computer forensics to identify relevant information involving the preservation, collection, analysis, and reporting of electronic evidence. Mr. Barba also helps clients by advising on cost reduction methods involving the preservation of sensitive data on computer networks in anticipation of future data production needs. He has provided testimony before a federal grand jury regarding industrial espionage and theft of trade secrets involving $80 million and has been deposed as an FRCP Rule 30(b)(6) e-discovery witness. He often works closely with federal, state and local law enforcement agencies on matters, and has worked with the Federal Bureau of Investigations, Secret Service and Alcohol, and Tobacco & Firearms. Mr. Barba holds numerous certifications including Certified Information Security Systems Professional (CISSP), GIAC Systems and Network Auditor (GSNA), Digital Forensic Certified Practitioner, EnCase Certified Forensic Examiner (EnCE), Certified Protection Professional (CPP), and is a Lexis Nexis LAW Pre-Discovery Certified Administrator.  

Related Posts

GFT Canada Update

GFT Expands AI Compliance Suite for Canadian Credit Unions

by Corporate Compliance Insights
May 8, 2025

Digital transformation company GFT has expanded its compliance suite to help Canadian credit unions combat payment scams and identity theft...

AxiomGRC Launch

Business Resilience Platform Axiom GRC Enters Global Market

by Corporate Compliance Insights
May 8, 2025

A business resilience platform called Axiom GRC has launched in the UK, backed by £500 million private equity investment from...

MyCOI Launch

myCOI Launches AI-Powered Insurance Compliance Platform

by Corporate Compliance Insights
May 8, 2025

Insuretech provider myCOI has launched illumend, an AI-powered platform designed to manage third-party insurance compliance and certificate of insurance processing....

Beachhead Documentation Launch

Beachhead Solutions Launches Compliance Documentation Tool

by Corporate Compliance Insights
May 8, 2025

Data security provider Beachhead Solutions has launched ComplianceEZ, a new compliance documentation tool built into its BeachheadSecure platform. The tool,...

Next Post
Improving Compliance with Data Science

Improving Compliance with Data Science

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights