Remove tag data-protection-authority
article thumbnail

Quality Control, Making Sure the Numbers Add Up: eDiscovery Throwback Thursdays

eDiscovery Daily

Our seven-custodian example might be a bit light for the amount of email we get today, but it’s still a relevant exercise. Example of File Count Tracking. So, now that we’ve discussed the various categories for tracking files from collection to production, let’s walk through a fairly simple eMail-based example.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Yesterday, we looked back at cases related to passwords and Fifth Amendment protection, non-party discovery and mobile and messaging. There are always a handful of cases each year related to discovery of social media data. Oh, and a photo on social media can be discoverable simply because you’re “tagged” in it.

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

In the book The Art of Invisibility , I challenged my co author Kevin Mitnick to document the steps needed to become invisible online. SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. In 2011, there a was user in a chat room by the name of altoid, like the mint.

Privacy 52