Remove Blog Remove Computer and Electronics Remove Government Remove Tips
article thumbnail

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

In this blog series, TSLAC analysts highlight and extol the virtues of their favorite record series. Let’s look at the series, both on the Local Government and State Agency Schedule. CAUTION: Software needed for access to electronic records must be retained for the period of time required to access the records. 13 TAC 6.94.

article thumbnail

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

In this blog series, TSLAC analysts highlight and extol the virtues of their favorite record series. Let’s look at the series, both on the Local Government and State Agency Schedule. CAUTION: Software needed for access to electronic records must be retained for the period of time required to access the records. 13 TAC 6.94.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is data loss and how does it work?

IT Governance

In this blog, we explain what you need to know and provide data loss prevention tips. Unlike desktop computers, laptops don’t have extra covers to protect them from water damage, which increases your risk of electronic components short circuiting. Computer viruses. appeared first on IT Governance UK Blog.

IT 98
article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! Of course, as you probably know by reading this blog, the DLA Piper situation isn’t unique. An article written by Anton Janik, Jr. No exceptions*. And, Model Rule 1.4

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

Dun & Bradstreet said that so far this year it has received over 4,700 tips and leads where business identity theft or malfeasance are suspected. For its part, Dun & Bradstreet recently published a blog post outlining recommendations for businesses to ward off identity thieves. ” PHANTOM OFFICES.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

Now, Tom has written another terrific overview for Understanding eDiscovery in Criminal Cases that we’re happy to share on the eDiscovery Daily blog. But first, a note about a new feature we’re adding to eDiscovery Daily: Our new eDiscovery Tech Tip of the Week ! The government will usually get its ESI by consent or warrant.

article thumbnail

Ignoring Internet of Things Devices Could Be IdIoTic: eDiscovery Trends

eDiscovery Daily

However, Walton suggested lawyers should always evaluate if their client’s legal matter warrants obtaining information from an IoT device and make proportional requests for the data, an approach that also governs other types of discoverable content. Further, it addresses topics including data privacy, fog computing, smart cities and more.