Remove 10
Remove 2015 Remove 2019 Remove Examples Remove Exercises Remove Security
article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. The principle of proportionality in civil discovery is hardly new.4 5 In keeping with that aim, the scope of discovery has always been cabined.

Privacy 97
article thumbnail

The Hacker Mind Podcast: How To Become A 1337 Hacker

ForAllSecure

But it wasn’t until I was watching Britney Runs A Marathon, a critically acclaimed 2019 film, that it occurred to me that people who don’t run 5Ks, 10Ks or full-on marathons are under the mistaken impression that I might be running to WIN the race. So perhaps a better example is Zarata, who we met in EPISODE TWO.

article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. The Gator3 watch turned out to have even more serious security flaws, storing parents and kids’ voice messages on an openly available webserver. but the link to the privacy and security policies was dead.

Passwords 111