“What if a delivery drone falls on your head?” asks the Los Angeles Times, in a piece that contemplates the liabilities associated with using drones to transport merchandise from warehouse to the customer’s doorstep. While the drone is at the center of the incident, it is a single spoke connected to a hub of transportation logistics. Liability will be difficult to sort out.
Category Archives: Process and Policies
Maybe you heard about an insurance case in which sides both sides got sanctioned over inadvertent exposure of confidential information by a nonlawyer associate. This story illustrates how electronically stored information (ESI) can get away from you, and has some suggestions for protecting privileged data. Click headline for full story.
Los Angeles County prosecutors were berated by a judge earlier this month, and were forced to watch key defendants in a public corruption case stroll into the sunset with a slap on the wrist, after they bungled electronic evidence management. The office now has a black eye arising from mishandling email. The Los Angeles Times […]
A new book, “Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry,” offers a clear lesson in how not to present technical evidence in court. Click the headline to read more.
There are more than a half billion used Android phones circulating out in the world, with previous owners’ account passwords, contacts, and other data potentially recoverable. Good news if you’re gathering evidence. Bad news if you sold your used Android. Click the headline to read more.
Child porn is the most frightening of contraband. The law-abiding person who discovers it on his computer is a witness to a crime, but he is also in possession, albeit passively. The law will view him as a criminal suspect. The attorney must be able to guide the process, acknowledging this jeopardy. Click the headline to read more.
A legal mess ensues when an insurance company denies cybercrime coverage because the insured failed to protect the data. And corporate boards are starting to hold CEOs accountable for data breaches. Click headline to read more.
Habeas Hard Drive’s own experience bears out the claim that damsels-in-distress have a very tough time making Facebook care about revenge porn. It’s agonizing for the humiliated party, who needs help from the social media site to positively identify the harasser or to remove the offending material, or both. The weeks turn into months with no action from Facebook.
A New York judge has flung the email discovery door wide open, granting unfettered access to a Gmail account. Judge Gabriel W. Gorenstein may as well have ordered both sides to spend more time, more money, and work much harder than they need to.
You’ve been warned, by none other than the U.S. Secret Service, that the computers in hotel business centers are attractive targets for information thieves. Habeas Hard Drive wishes to point out that plenty of schemes exist to slurp up digital assets from business travelers, and to physically steal laptops and mobile devices from hotel environments.