Woman using her phone with technical graphics in the background.

Hold My Phone: Part 1 – Preservation and Collection of Mobile Device Data

Share this article

Why mobile data matters in litigation and investigations

Mobile devices, especially smartphones, have become home to all manner of data about what we do. That means they should be seen as a key potential source of potentially relevant electronically stored information.

Smartphones have become ubiquitous. We step through life with our mobile devices ever at our sides. According to a recent report from British communications regulator Ofcom, 71% of adults in the UK say they never turn their smartphones off and 78% say they could not live without them.[1]

The data on smartphones – personal and business – rapidly is becoming comprehensive. Smartphones can track who we communicate with, when, how, and about what. They can record where we have been, how we got there, how long we stayed there.  As our smartphones travel with us, they capture a breadth and depth of information about us that can be stunning. They are our telephones and our communicators (think email, text messages, Facebook posts, WhatsApp, and Slack, just to mention a few platforms we use through our smartphones).  They are our cameras, our navigations systems. They are home to our contacts, our boarding passes, our reminder lists, the performance histories of our stocks.

Mobile data – the data available from and via smartphones and other mobile devices – is discoverable: to begin with. There is no doubt whatever about that. Rule 34 of the Federal Rules of Civil Procedure, for example, is clear on that point. FRCP 34(a)(1)(A) states in part: “A party may serve on any other party a request … to produce and permit the requesting party or its representative to inspect, copy, text, or sample the following items in the responding party’s possession, custody, or control: … Any designated documents or electronically stored information … stored in any medium from which information can be obtained directly….”

We use our smartphones to personal ends, of course, but also for business reasons. Bring Your Own Device (BYOD) programs have become commonplace. According to one recent survey, 83% of responding enterprises rely entirely or in part on BYOD programs[2].

Data from personal mobile devices used as part of a BYOD program can be discoverable. Notably, in May 2018 a leading commentator on e-discovery policy, The Sedona Conference, published a set of five principles related to the use of BYOD programs.[3] Principle 3 recognizes that mobile data can be discoverable. It states: “Employee-owned devices that contain unique, relevant ESI should be considered sources for discovery.” At the same time, Principle 5 tries to set some boundaries: “Employee-owned devices that do not contain unique, relevant ESI need not be considered sources for discovery.”

Preservation and collection challenges

When preserving mobile data, several technical and logistical challenges need to be addressed to ensure a defensible approach that minimizes disruption to the business and individual custodians.  One challenge of preserving mobile data is there is little option for preservation without collection.  Companies typically do not log information such as text messages, chat conversations, and call records on a central server.  The only way to preserve information stored locally on the device is to collect the data from each individual phone to prevent spoliation.

With most companies employing a BYOD model, any selected group of custodians often has a variety of different makes and models of smartphones.  The type of phone, operating system version, and custodial data management practices all affect the preservation approach; a single method may not work for all those custodians.  Sometimes, cloud-based backups of mobile data contain all the necessary information.  These backups generally can be collected remotely with minimal interruption to the custodian.  For other smartphones, the only option is a physical collection, which means the custodian may not be able to use the device for a couple of hours or more, depending on the volume of data on the phone.  All of these factors need to be considered when making a collection plan.

The question of exactly what data to preserve also will inform your collection plan.  You will need to decide whether the issues in the case necessitate a full collection of information or whether a targeted collection of information is sufficient.  It’s important to keep in mind that when custodians are using their personal devices for work, they will certainly have private information, such as personal photos, texts/chats with family and friends, GPS/location history, personal health information, and other data that usually is not relevant to the issues of a case and may be protected under privacy laws.  Depending on the location or nationality of a custodian, there may be statutes that require a targeted approach that avoids over-collection of personal information.  Even without such legal protections, custodians may be reluctant to allow their sensitive personal information to be collected.

Once you have determined what information needs to be collected, you may face technical challenges to retrieving that data.  A growing number applications support encrypted messaging, which can be particularly difficult to collect.  Multiple programs can be used to collect mobile device data. While most gather substantially the same data, the specific information needed from the device may dictate the tool that is used for the collection.  Additionally, operating system updates may render collection software incompatible or less effective.  Development updates by device manufacturers are a moving target for creators of mobile data collection software.

Finally, you need to think about ongoing preservation obligations.  For example, if custodians upgrades their devices while on legal hold, what do you need to do with the old devices?  Should they be physically retained or were the initial data collections sufficient?  Also, if there is a need to conduct refresh collections, you will need to remember any technical or logistical challenges that occurred in the past, as you may confront those same issues again.


When managing a case involving mobile device data, it is best to engage a technology advisor who can discuss the different options for preserving and collecting this challenging data type.  The preservation and collection approach will vary from case to case, and changes in technology will require evolving solutions and tools to meet preservation and collection obligations.

Of course, mobile device data presents challenges beyond preservation and collection.  Managing the review and production of this data is more complex than traditional ESI sources.  In our next post, we will be discussing review and production considerations for mobile data.


[1] A decade of digital dependency (Aug. 2, 2018), https://www.ofcom.org.uk/about-ofcom/latest/features-and-news/decade-of-digital-dependency

[2] Eric McCarty, The State of Enterprise Mobility in 2018: Five Key Trends (June 6, 2018), https://insights.samsung.com/2018/06/06/the-state-of-enterprise-mobility-in-2018-five-key-trends/. Seventeen of enterprises provide mobile phone to all employees (no BYOD there); 31% provide no mobile devices to their employees, relying entirely on employees to use their own devices; and 52% use hybrid approaches.

[3] For detailed discussion on BYOD legal issues, see The Sedona Conference Commentary on BYOD: Principles and Guidance for Developing Policies and Meeting Discovery Obligations, 19 Sedona Conf. J. 495 (2018).

George Socha on Email
George Socha
Senior Vice President of Brand Awareness at Reveal
George Socha is the Senior Vice President of Brand Awareness at Reveal, where he promotes brand awareness, helps guide development of product roadmap and consults with customers on effective deployment of legal technology.

Named an “E-Discovery Trailblazer” by The American Lawyer, George has assisted corporate, law firm, and government clients with all facets of electronic discovery, including information governance, domestically and globally. He served clients in a variety of industries including pharmaceutical, energy, retail, banking and technology, among others. As a renowned industry thought leader, he has authored more than 50 articles and spoken at more than 200 engagements across the world on a variety of e-discovery topics. His extensive knowledge has also been utilized more than 20 times to provide expert testimony.

Co-founder of the Electronic Discovery Reference Model (EDRM), a framework that outlines the standards for the recovery and discovery of digital data, and the Information Governance Reference Model (IGRM), a similar framework specific to information management, George is skilled at developing and implementing electronic discovery strategies and managing electronic discovery processes.

Share this article