Remove 12
Remove 2013 Remove 2017 Remove Computer and Electronics Remove IT
article thumbnail

The Sedona Conference Has an Updated Commentary on Rule 45 Subpoenas to Non-Parties: eDiscovery Best Practices

eDiscovery Daily

Last week, The Sedona Conference® (TSC) and its Working Group 1 on Electronic Document Retention & Production (WG1) announced the publication of the Public Comment Version of The Sedona Conference Commentary on Rule 45 Subpoenas to Non-Parties, Second Edition. That was 12 years ago! Been meaning to cover this for a few days now.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

12 In other words, the 1983 amendment was seen as limiting the depth rather than the breadth of discovery.13. 12 In other words, the 1983 amendment was seen as limiting the depth rather than the breadth of discovery.13. The revised Rule “recogni[zed] that the right of pretrial disclosure is subject to some limitation beyond relevance.”10

Privacy 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Finding the treasure in governement information management

CILIP

At the start of the Grenfell Tower inquiry in 2017 we shared some of our material with a third party linked to the Public Inquiry. Regulatory load With burgeoning amounts of information and regulation, is the job getting harder? But regulatory load quite often comes with other problems, like deadlines.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

12 of the Massachusetts Declaration of Rights), and the court remanded the case to the Superior Court for entry of an order compelling the defendant to enter the password into the cell phone at issue in the case. Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

ICYMI, Equifax forced to pull offline a huge database of consumer data guarded only by credentials "admin/admin" [link] — briankrebs (@briankrebs) September 13, 2017. Starting with her first desktop on a Unix machine at age 12, Eva Galperin’s contributions to cybersecurity include research on malware and privacy.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. New technologies have started innumerable economic revolutions, and the pace of change continues to accelerate. Data is not just a resource for better marketing, better service and delivery. Data is used to build products themselves.

GDPR 120