There are a number of things to consider when using digital forensics for investigating potential theft or improper usage of proprietary data. Bring Your Own Device protocols add complexity to a situation in which corporations already use traditional data sources such as a desktop, laptop, server and corporate email. There are certain electronic data sources […]
The post Protecting the Corporate Jewels appeared first on Today's General Counsel.