No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Internal Investigations: Managing Mobile Device Data in the Age of COVID

A Thoughtful Approach to E-Discovery

by David Carns
October 7, 2020
in Cybersecurity, Featured
man holding mobile phone against grassy backdrop

An internal investigation can feel like a high-stakes game of needle-in-the-haystack, and current world challenges set that haystack on fire. Casepoint’s David Carns addresses how organizations can plan to respond effectively while avoiding cost and risk.

While most of today’s law departments are highly proactive when it comes to e-discovery and have solid workflows and tools for managing the entire process, internal investigations do not always inspire the same level of diligence and planning. It’s surprising how many companies still lack formal processes for investigations and fail to consider appropriate technology for preservation, collection, processing and review until they find themselves in the middle of high risk, data-intensive matter. This is unfortunate, because internal investigations can be quite unpredictable. It’s difficult to anticipate where the facts will lead or what legal and logistical complications may arise. Project scope and costs can quickly get out of control, too.

The emergence of COVID-19 has added a new wrinkle to investigations. Because nearly everyone is working remotely, more of the information that needs to be identified and collected is on mobile devices. This is true whether the devices are corporate-issued or employee-owned. That means investigation teams are increasingly reliant on mobile device management (MDM) software or utilities to help collect the necessary information for a new matter so the data can be analyzed for relevance. In today’s work environment, data collected using MDM software is particularly germane to investigations originating with HR, such as allegations of discrimination, harassment, cyberbullying, stalking and similar misconduct.

What is MDM?

Lawyers and risk managers who are involved in data discovery of any kind should be aware that MDM is very likely being deployed across their enterprise and is an increasingly important forensic tool for discovery. Nearly every corporate IT department uses MDM software to securely manage and monitor the use of smartphones, tablets and laptops by employees. In a bring-your-own-device (BYOD) world, MDM is an important security solution that helps IT ensure equipment is configured and updated in a consistent, standardized and scalable way and makes remote diagnosis and troubleshooting of problems more efficient. MDM also allows IT personnel to track exactly how employees are accessing company data, files and email, effectively unifying siloed information into a single, trackable system. From a forensic standpoint, MDM can provide investigators with valuable information about multiple data types, like text messages, voicemail and call logs; such data often includes geographical locations.

MDM is necessary for employees to access corporate email on a device; it also gives companies the capacity to remotely “wipe” email from devices, if necessary. From an investigative standpoint, MDM is not only an important centralized source of information about employees’ use of applications like email, voice and chat, but it also documents with precision when and how employees are using various devices from various locations to access the corporate information system. That said, while MDM can find a lot of the information that legal teams need for internal investigations, it can’t find everything.

Free E-Book Download: The Art of the Internal Investigation

Without the Right Tool, MDM Data is Extremely Difficult to Interpret

In the event of an internal investigation, extracting and decoding data from devices equipped with MDM typically falls to IT, and it’s a good bet they use a particularly good forensic tool for that purpose called Cellebrite. Although it’s not the only forensic software out there, just about every law firm I know of uses Cellebrite. Its output is difficult for most people to make sense of, however; a Cellebrite report is a lot like a very extensive spreadsheet. The information it contains is comprehensive and highly accurate, but interpreting that data can be a nightmare for nontechnical users like lawyers, who are likely to run to IT for help.

Fortunately, at least some e-discovery tools can convert data extracted with Cellebrite into easy-to-comprehend, sequentially organized, chat-like conversations that mimic the “look and feel” of person-to-person interactions as they appear on a phone. This is rapidly becoming a mandatory technical capability for organizations that are serious about conducting internal investigations efficiently and cost effectively. Instead of leaving lawyers to wade through columns of data at prohibitive hourly rates, a good tool for converting Cellebrite output will convert that data into a usable format designed to reveal a multi-layered “story” based on call data, social media, chat and other apps or functions.

Internal Investigations Merit a Thoughtful Approach

The emerging relevance of MDM data to investigations is a key development, and it highlights the importance of understanding your organization’s technology infrastructure and identifying cost-effective technologies for discovery before the next investigation gets underway.

Other best practices to consider:

Don’t Be Tempted to Take Shortcuts

Make sure the collection tools you use deploy official APIs from Dropbox, Microsoft, Google Docs and other common repositories to ensure you get an accurate data set and are able to pull the most recent version of any document, with the option to go back and look at previous versions. While some very large companies may still choose low-tech, ad hoc procedures — like loading emails into Outlook to analyze custodian communications — that’s a very bad idea. Always use purpose-built tools that don’t risk inadvertent data modification or destruction. Even apparently minor investigations can quickly grow into high-stakes matters and should always be managed as such.

Consolidate Technology for Accuracy and Efficiency

Use an integrated SaaS e-discovery and data discovery platform that can manage the data at every phase of investigation in single interface. Ideally, it will:

  • Have built-in artificial intelligence (AI) technologies like machine learning and predictive coding so you can run data-intensive searches with optimal speed and accuracy.
  • Include multilingual capabilities to help you avoid costs associated with translation and/or multilingual reviewing.
  • Provide easy access to data — without risk of data loss or alteration — as well as a complete tool set for performing investigative work to teams distributed across the country or across the world.
  • Support hundreds of file types used in corporate environments so you can immediately open and comprehend files, even if you don’t actually have the application installed in your own department. MDM data is just one of many examples of software that generates invaluable information but can be virtually incomprehensible to lawyers if it isn’t converted into a usable format.

Standardize Processes and Workflows Across the Organization

Treat internal investigations like any other legal matter that presents financial and reputational risks. Establish (and put into writing) a formal procedure for conducting internal investigations that identifies stakeholders and roles and outlines in detail how your team will respond to each of the five key phases, including the trigger event; legal hold and custodian interviews; requests for data and data collection; processing, review and analysis of documents and other materials; and recommendation for next steps. Among other benefits, formalizing your approach will force you to gain a better understanding of your information infrastructure and create awareness of the applications (like MDM) that are most likely to come into play the next time a matter for investigation arises.


Tags: BYOD/Bring Your Own DeviceCOVID-19Data Governancee-DiscoveryInternal Investigation
Previous Post

Zoom HIPAA Compliance: What You Need to Know

Next Post

An Intersection Between Ransomware and U.S. National Security: OFAC Speaks

David Carns

David Carns

David Carns is the Chief Revenue Officer of Casepoint. He joined Casepoint as a Director of Client Services in 2010 and rose through the ranks to Chief Strategy Officer until his most recent promotion in 2019. In addition to being a recovering attorney, David possesses a lifelong passion for technology and its advancements. Prior to joining Casepoint, David Carns’ positions included Director of Practice Technology at a premier global law firm, Technology Consultant, and Director of Technology. Carns holds a Juris Doctorate from The John Marshall Law School and a bachelor’s degree in Philosophy from DePauw University.

Related Posts

doj building sign with flags

‘Reasonable Steps’: What the DOJ Expects From Your Bulk Data Transfer Compliance Program

by Alexandra P. Moylan, Alisa L. Chestler and Michael J. Halaiko
May 5, 2025

Sample provisions offer blueprint for compliant data brokerage with foreign entities

data security program concept cameras

Your Sensitive Data Is Now a National Security Matter: The DOJ’s New Data Security Program

by Randall Cook, Vince Mekles and Rachel Woloszynski
April 29, 2025

90-day implementation window closing on regulations affecting companies with genomic, biometric, health and other personal information

Electronic Evidence Collection for eDiscovery and Compliance

Electronic Evidence Collection for eDiscovery and Compliance

by Corporate Compliance Insights
March 30, 2025

Are you prepared to manage modern data sources in your compliance program? Whitepaper Electronic Evidence Collection for eDiscovery and Compliance...

examining data on laptop screen

Privacy Rights Surge Forces Rethink of Data Management

by Gal Ringel
March 14, 2025

As global privacy regulations multiply, organizations face mounting pressure to efficiently respond to data subject requests amid complex data environments

Next Post
hacker offering key to unlock encrypted data for money

An Intersection Between Ransomware and U.S. National Security: OFAC Speaks

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights