Extract from Yohai West's article "3 Ways Accessing Mobile Device Data Is Key to Border Security"
One of the greatest challenges facing border agents around the world is accessing data swiftly at checkpoints to determine whether those wishing to cross into another country are good to go or pose a potential threat. Typically, a border agent may only have a few seconds to verify:
Who the person is? Are they really who they say they are? Do they pose a threat?
Complicating this problem is that in many areas, those wishing to cross may not have any documentation. (Greece’s border challenges with the large influx of refugees arriving daily from Africa comes immediately to mind). Many, however, are carrying a mobile device and the data that’s stored there can be key to identifying criminals and keeping borders secure.
I wanted a certification that separates me from my peers. Upon discovering CEDS, I was convinced this was exactly the type of distinction I had been seeking. Since achieving CEDS certification, I’ve noticed immediate recognition from my organization, colleagues, and current and prospective clients.They acknowledge they are more comfortable working with a person who has taken time to seek such certification. CEDS has certainly been worth the small investment and should continue to beget returns for years and years to come.
Andrew Bayer, CEDS
I get bombarded with all kinds of e-discovery stuff – news, blogs and whatnot. Let me tell you, you guys send the absolute best! I send it to all my partners and sales folks. I said, who are these guys? I have to get to know them better!
Kevin Glass, CEO
As a trial lawyer, day-to-day information processing is daunting for my client service. I’ve come to rely on ACEDS to keep me on the ‘edge’ of the curve on e-discovery. It’s a source I ‘ping’ ASAP.