article thumbnail

This is the old ChiefTech blog.: Social Data Analysis. But what about compliance?

ChiefTech

Wednesday, 24 January 2007 Social Data Analysis. Its also interesting to consider with these social data analysis tools that not only are they making data analysis "social", but I can also see tools like begin to challenge our concept of a basic information unit like a "document". Please seek advice for specific circumstances.

article thumbnail

Standardizing the Non-Standard Digital Forensics Protocol, Sort Of: eDiscovery Best Practices

eDiscovery Daily

Craig thoroughly covers the considerations regarding drafting a sensible forensic examination protocol (which, as Craig notes, “demands a working knowledge of the tools and techniques of forensic analysis so counsel doesn’t try to misapply e-discovery methodologies to forensic tasks”). 2008 WL 744837 (W.D. 17, 2008).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Should privacy be considered a “burden” under the proportionality analysis required by Federal Rule of Civil Procedure Rule 26(b)? 3 As a result, an emerging consensus of courts and commentators has concluded that privacy interests may — and indeed, should — be considered as part of the proportionality analysis required under Rule 26(b)(1).

Privacy 97
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. The intent of this analysis is to link the scope and the CSFs with the use cases into a succinct narrative describing the new DT capabilities to deliver products and services. DT Capabilities. 2020, p 6).

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud. As is true with any cloud service, the Seattle cloud computing company emphasizes the shared responsibility model. Out of Palo Alto, California, Cloudera started in 2008 by alumni of Google, Yahoo!, Alibaba Cloud.

Security 106
article thumbnail

Is APT27 Abusing COVID-19 To Attack People ?!

Security Affairs

Web-Based Enterprise Management (WBEM) comprises a set of systems-management technologies developed to unify the management of distributed computing environments. According with Trend Micro , the PlugX malware family is well known to researchers having samples dating back to as early as 2008. OCX VT coverage. neighboring[.]site/01/index.php.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. If you think that your data has been anonymised, according to the computational privacy group at Imperial College, you will be wrong. I received last week a letter as chair of Marlesford Parish Council.

GDPR 120