Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Information Governance and Compliance Regulation Technology Media and Telecom

Assess Your Information Governance Practices In Light of DOJ and SEC Crackdown on Use of Personal Devices and Messaging Apps

This article summarizes the DOJ’s recent guidance and the SEC’s enforcement trends and priorities in this area, and it provides information governance best practices companies can implement now to ensure they are meeting regulators’ expectations and recordkeeping rules.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Regulators increasingly are scrutinizing employee use of personal devices and third-party messaging apps ― in particular, but not only, ephemeral apps where messages automatically disappear ― as employees continue to conduct business on multiple platforms and concurrent channels of communication. The Department of Justice (DOJ) recently issued its most comprehensive guidance to date on its expectations that companies preserve all business communications conducted on personal devices and messaging apps. And the Securities and Exchange Commission (SEC) and Commodity Futures Trading Commission (CFTC) continue to aggressively enforce their recordkeeping rules against regulated entities that do not properly preserve their electronic business communications. Notably, while the SEC and CFTC have been focused on regulated entities, the DOJ’s guidance applies to all businesses.

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next