Getting a clue: uncovering the truth about your data with mobile forensics
Six years ago, I.T.’s main source of truth when it came
to legal and compliance rested in email servers. These
days, work communications have evolved and are not
limited to just laptops. They have burst on the scene
with text, instant messaging, and mobile sharing apps.
Where is your data going? Where is it stored?
• Where is the backed-up data stored?
• What are our retention and archival policies?
• How is the company currently backing up the data stored on
laptops, desktops and mobile devices (a.k.a. endpoints)?
• Which devices — Windows, Mac, iOS, Android, Linux, etc. —
are in use?
• How do we manage data belonging to ex-employees?
• How does our existing software handle and implement
data privacy and conﬁdentiality policies?
• Can we collect and preserve deleted messages?
• How can I monitor messaging communications on
mobile devices for adherence to regulatory
mandates or internal compliance policies?
• Give Legal information about the company’s
• Educate Legal on all the software I.T. uses to
• Look for opportunities for I.T. to identify and collect
data that can facilitate repeatable collections and
reduce spoilage risk
• Involve Legal early in the process while evaluating
data-protection software that enables eDiscovery
• Enable access to advanced audit capabilities that ensures
full chain of custody
• Choose software that helps Legal do its own data retrieval
Druva is the only company in the data protection space that
enables companies to grab 100% of data off mobile devices.
Learn more at
- Gibson Dunn, “2015 Mid-Year E-Discovery Update”,
- RingCentral, “Big changes in business communications”,
- Smarsh, “2015 Electronic Communications Compliance Survey Report”
of business users use text
messaging for business
communications. Those text
messages can pose a signiﬁcant risk.
of those that allowed text
messaging had minimal or
no conﬁdence in their
ability to produce messages if requested.
Outside of audits, litigation and
e-discovery requests are the
GETTING A CLUE:
UNCOVERING THE TRUTH ABOUT YOUR DATA
WITH MOBILE FORENSICS
STANDARD QUESTIONS LEGAL HAS FOR I.T.
DURING DISCOVERY OF DATA:
Enterprise I.T. can play a critical role in creating a plan to address the mobile eDiscovery risks.
WITH MOBILE FORENSICS, I.T. CAN:
Texts and instant messages are increasingly at issue in
investigations and litigation. But extracting them from
mobile devices can be expensive and time consuming,
if possible at all.”
- Gibson Dunn “2015 Mid-Year E-Discovery Update”
I think I left my laptop a
L I had so many important ﬁles on
There’s a package at my desk
it but I opened it anywa
at the restaurant at 7:30. Bring your
you, I want to discuss the
Do you know the password to the NAS drive? Need to access some impo
not supposed to say anything but Bob is getting ﬁred for a