Human Resources department is the greatest leaker of trade secrets

Job postings are among the richest source of valuable company information. One help-wanted ad for an IP law firm offers a link to “our client list.” For business spies, that's like a neon sign that says, “We have secrets belonging to the following companies!”

Porn lawsuit intended to send Facebook a message: Be responsive to privacy violations

Habeas Hard Drive’s own experience bears out the claim that damsels-in-distress have a very tough time making Facebook care about revenge porn. It’s agonizing for the humiliated party, who needs help from the social media site to positively identify the harasser or to remove the offending material, or both. The weeks turn into months with no action from Facebook.

Business travelers beware: hotels are dangerous places, period.

You’ve been warned, by none other than the U.S. Secret Service, that the computers in hotel business centers are attractive targets for information thieves. Habeas Hard Drive wishes to point out that plenty of schemes exist to slurp up digital assets from business travelers, and to physically steal laptops and mobile devices from hotel environments.

SCOTUS cell phone decision has application to civil eDiscovery

The so-called “internet of things” will produce exponentially more information related to every human life, and more incursions into personal privacy. What is the limit on eDiscovery when your mattress is equipped to send a signal to the coffee pot and the thermostat as soon as it detects that you’ve stirred in the morning?

Evidence source: Dropbox attack victims may be employees who ignored their company’s policies

Cyberattacks against Dropbox are proliferating. Just as litigators have been forced into familiarity with social media as a source of evidence, they will also get to know Dropbox.

As Dropbox and similar file-sharing services are more widely adopted, and as their contents escalate in value – intellectual property and human resources data come to mind – they will be a growing source of leaked information and cyberattacks. Examining security policy, and its enforcement around file-sharing products, will be a key task for litigators, as will discovering which employees have complied and which have not. Click headline to read more.