Remove 2011 Remove Communications Remove Computer and Electronics Remove Security
article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. Hieu Minh Ngo, in his teens. BEGINNINGS.

article thumbnail

French Data Protection Authority Unveils Its Agenda for 2012

Hunton Privacy

The CNIL also indicated that it will continue the work started in 2011 with at least 150 additional inspections related to video surveillance, especially with respect to surveillance in locations that are frequented by large numbers of individuals. The storage of health records using cloud computing solutions will be of particular interest.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Windstream Communications LLC , Ohio Magistrate Judge Kimberly A. Los Alamos National Security, LLC et. 2011: Part 1 , Part 2 , Part 3 , Part 4. Wilkinson, Jr. Cloud Data is Within Defendant’s Possession, Custody and Control, Court Rules : In Williams v. WAIVER OF PRIVILEGE. New Mexico Magistrate Judge Karen B.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. Holmes, III indicated his belief that the use and “necessity of manually configuring [the messaging app] Signal to delete text communications” on the part of the plaintiffs was “intentional and done in bad faith”.

article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

These can come in a variety of forms we’ll discuss in more detail below, but the most common in a modern office setting is software monitoring, where a piece of software is installed onto employees’ computers, which can then track things such as web activity. Want to Make Sure Remote Workers Can Access Your Network Securely?

IT 126
article thumbnail

White House Proposes Cybersecurity Legislation

Hunton Privacy

As we reported last week , on May 12, 2011, the Obama administration announced a comprehensive cybersecurity legislative proposal in a letter to Congress. Homeland Security Provisions. Puerto Rico and the U.S. Virgin Islands. A covered facility also would be required to make a high-level overview of the plan publicly available.

article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

Often the tiny flashing light on the dashboard also alerts would-be criminals that the car is protected by the latest form of anti theft security. A sophisticated set of encryption and electronics is at work inside the vehicle. Just because it has all the bells and whistles doesn’t necessarily mean it’s secure.