article thumbnail

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

The Last Watchdog

Here are a few unexpected examples of supposedly anonymous data reversal: •In 2016, the Australian government released what they called the “anonymous” (i. Metadata spying. Metadata is worthy of a separate examination. Metadata can be used to reverse-engineer and pinpoint identity quite easily.

Metadata 230
article thumbnail

Melbourne professor quits after health department pressures her over data breach

The Guardian Data Protection

In 2016, Vanessa Teague, a cryptographer from the University of Melbourne, and two of her colleagues reported on a dataset , published on an open government data website by the federal government, of 2.5m million Australians being re-identifiable online due to a government bungle.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Court Rules on Dispute over Native File Format Production and Metadata: eDiscovery Case Law

eDiscovery Daily

native files with metadata) and also ordered the defendants to file an itemization of costs and fees, including attorney’s fees, incurred in making the Motion to Compel. Some of Defendants’ filings could be interpreted to argue that Defendants are entitled to all metadata related to the documents previously produced. Case Background.

article thumbnail

Metadata from Photos Leads to Dismissal of Case Against New York City: eDiscovery Case Law

eDiscovery Daily

In this case involving claims against the NYPD after an alleged warrantless search of the plaintiff’s home in August 2014, the plaintiff provided photographs that she claimed depicted the condition of her apartment several days after the incident in September 2016.

article thumbnail

SILENTFADE a long-running malware campaign targeted Facebook AD platform

Security Affairs

Facebook shared details about a long-running ad-fraud campaign that’s been ongoing since 2016 targeting Facebook users with SilentFade malware. Upon stealing Facebook-related credentials, SilentFade retrieves the metadata of the Facebook account (i.e. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

In Search of Cases Where Production of Databases Has Been Ordered: eDiscovery Case Law

eDiscovery Daily

Here are three cases where parties were required to produce databases, or provide access to those databases or provide metadata from database systems: Advanced Tactical Ordnance Systems, LLC v. 22, 2016) : Utah Magistrate Judge Paul M. 27, 2016) : Nebraska Magistrate Judge F.A. Real Action Paintball, Inc., 1:12-CV-296 (N.D.

article thumbnail

Even with Bad Communication and Unfulfilled Discovery Obligations, Sanctions Still Not Granted: eDiscovery Case Law

eDiscovery Daily

It was also charged that the relators intentionally deleted computer files concerning these conversations and threw away the computer on which the files were stored, thereby precluding examination of the relevant metadata.