Remove 2010 Remove Computer and Electronics Remove Education Remove IT
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. This includes defining the product scope of the DT journey and the digital products and services that will deliver transformative change for a new future. Here, Part 3 discusses how to manage the various DT risks.

article thumbnail

Hewlett-Packard/Autonomy Deal Results in More Indictments: eDiscovery Trends

eDiscovery Daily

Lynch used false and misleading statements from 2009, 2010 and early 2011 “to make Autonomy more attractive to a potential purchaser like HP,” according to the indictment, which says Lynch made $815 million when HP acquired his Autonomy shares. Lynch’s lawyers called the indictment a travesty, saying it shouldn’t have been brought in the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

Here are the interviews that we will be publishing over the next few weeks: Wednesday, March 14: Tom O’Connor. E-discovery luminary and recipient of the Masters Conference Educator of the Year 2016, Mary provides ACEDS and its membership more than a decade of strong credibility and sound leadership within the e-discovery community.

article thumbnail

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Two

eDiscovery Daily

Throughout the case, the plaintiff claimed that the evidence needed to prove the case existed in emails stored on UBS’ own computer systems. That case and the subsequent rule changes effectively forced civil litigants into a compliance mode with respect to their proper retention and management of electronically stored information (ESI).

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

We’re up to 719 lifetime case law related posts , covering 558 unique cases since our inception back in 2010. Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. The same number of cases as last year and less than a lot of years (believe it or not).

article thumbnail

European Data Privacy Day Expert Panel Provides 30-Year Retrospective on UK Data Protection

Hunton Privacy

Howe set up the first system of registration for data users (as they were then called), encouraged the development of sectoral codes of practice, provided education, raised awareness of data protection and managed privacy-related complaints. In setting up the registration system for data users, his office focused on major UK data controllers.

article thumbnail

Office 2.0 Conference September 3-5 | ZDNet

Collaboration 2.0

Plug a keyboard and mouse into a PS3 and you have a pretty good cloud computing home workstation - we had the session schedule up and running in this format. Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Hot Topics iPhone iPad Enterprise 2.0 Office 2.0 Office 2.0