Data-protection methodology has been with humans for thousands of years, but only recently has it increasingly become a ubiquitous part of our technology-driven lives. Clearly, statutes and regulations have recently evolved mandating its regular use in various arenas of the business world, but even the everyday consumer faces the reality that security hardware and software come with such technology already built-in.

Inevitably, legal issues have begun to arise regarding this form of technology. Least surprising, search-and-seizure issues regarding law enforcement’s attempts to circumvent data-protection methods are at the forefront. The first-half of 2017 has produced some interesting results and court analyses.1

Non-Alteration Techniques