Remove 2010 Remove Computer and Electronics Remove e-Discovery Remove Security
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

We’re up to 719 lifetime case law related posts , covering 558 unique cases since our inception back in 2010. Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. NON-PARTY DISCOVERY. Commc’ns Unlimited Inc. Missouri District Judge Rodney W.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Historically, the scope of discovery under Rule 26 of the Federal Rules of Civil Procedure and its state law analogues was defined exclusively in terms of relevance, with privilege providing but a narrow exception. To be within the scope of discovery, an inquiry now must be both relevant and proportional.

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Naturally, database vendors are leading providers of database security tools, and a growing number of cloud-based database providers are moving deeper into the data security space. Security is paramount. Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud.

Security 120
article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Two

eDiscovery Daily

Throughout the case, the plaintiff claimed that the evidence needed to prove the case existed in emails stored on UBS’ own computer systems. That case and the subsequent rule changes effectively forced civil litigants into a compliance mode with respect to their proper retention and management of electronically stored information (ESI).

article thumbnail

Broadcast or communicate? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Email in the enterprise is closely monitored and lives forever – the ‘paper trail’ it leaves is valuable for legal discovery and disciplinary action. The goal of course was to tell [.]