Remove 2012 Remove Computer and Electronics Remove Education Remove Security
article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “Shevlyakov also attempted to acquire computer hacking tools.” ” reads a press release published by DoJ.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I didn’t know either of them, but I have been writing about cryptography, security, and privacy for decades. I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. It made sense. Probably not.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Draft Released in the Philippines Implementing Rules for the Data Privacy Act

Hunton Privacy

On June 17, 2016, the National Privacy Commission (the “Commission”) of the Philippines released draft guidelines entitled, Implementing Rules and Regulations of the Data Privacy Act of 2012 (“IRR”), for public consultation. Consent of the data subject has to be evidenced by written, electronic or recorded means.

article thumbnail

Hewlett-Packard/Autonomy Deal Results in More Indictments: eDiscovery Trends

eDiscovery Daily

billion charge in 2012. Then, earlier this year , former Autonomy CFO Sushovan Hussain was convicted of 16 counts of wire and securities fraud related to the $10.3 which was formed in the breakup of HP’s corporate computing divisions from its printer and PC business in 2015) praised the indictment. “HPE billion transaction.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. Tomorrow, we will cover cases related to cooperation, form of production, privilege and confidentiality disputes, social media related disputes and a key case regarding biometric security. Stay tuned!

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Los Alamos National Security, LLC et. 2012: Part 1 , Part 2 , Part 3 , Part 4. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. Wilkinson, Jr.