Calculating electronic records storage costs

The Schedule

This post will do the same for electronic records and follows the same formula of not taking into account personnel or overhead costs or depreciation of equipment. Calculating the costs for storing your electronic records on premise will largely depend on the size of your organization.

RCE flaw in Electronic Arts Origin client exposes gamers to hack

Security Affairs

Electronic Arts (EA) has fixed a security issue in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts already released a security patch for the remote code execution vulnerability.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. Tsakalidis said that he had contacted Electron about the vulnerability but that he had gotten no response -- ­and the vulnerability remains.

Tools TSLAC Uses To Access and Make Available Older Formats

The Texas Record

If you’ve ever taken our Managing Electronic Records class or perused our electronic records webinars, you’re aware that a major responsibility for storing records electronically is providing continuous access to those records throughout their life cycle.

More Attacks against Computer Automatic Update Systems

Schneier on Security

According to our researchers, the attackers either had access to the source code of the victims' projects or they injected malware at the time of project compilation, meaning they were in the networks of those companies.

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

FAQ: How does web archiving fit into records management?

The Texas Record

Last but not least, think about how the ease of access to your records, their security and management, and your service contract could be affected if your web archiving provider experiences an event that threatens its systems or if it joins forces with another company.

Capital One data breach: hacker accessed details of 106M customers before its arrest

Security Affairs

A hacker that goes online with the handle “erratic” breached the systems at Capital One and gained access to personal information from 106 million Capital One credit applications. Thompson was charged with computer fraud and abuse in U.S. Capital One, one of the largest U.S.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

My favorite holds an incredibly special place in my heart, for this series encapsulates the essence of good records management and the goal of accessibility. CAUTION: Software needed for access to electronic records must be retained for the period of time required to access the records.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

My favorite holds an incredibly special place in my heart, for this series encapsulates the essence of good records management and the goal of accessibility. CAUTION: Software needed for access to electronic records must be retained for the period of time required to access the records.

Supreme Court of Pennsylvania Ruling on Common Law Duty to Protect Electronic Employee Data

Hunton Privacy

The case arose from a data breach in which criminals accessed UPMC’s computer systems and stole the personal and financial information of 62,000 current and former UPMC employees. The court held that: (1) an employer has a duty under Pennsylvania common law to use reasonable care to safeguard its employees’ sensitive personal information that it stores on Internet-accessible computer systems; and (2) Pennsylvania’s economic loss doctrine did not bar the plaintiffs’ negligence claim.

Appellate Court Vacates Order Allowing Plaintiff’s Expert Access to Defendant’s ESI Prior to Privilege Determination: eDiscovery Case Law

eDiscovery Daily

In this claim of retaliatory dismissals from the defendant’s community college in violation of the North Carolina Whistleblower Protection Act, the plaintiffs served discovery requests on the defendants, including for ESI located in the school’s computers and servers. In Crosmun v.

Maryland Court Finds Coverage for Lost Data and Slow Computers After Ransomware Attack

Hunton Privacy

State Auto Property and Casualty Insurance Company , finding coverage for a cyber attack under a non-cyber insurance policy after the insured’s server and networked computer system were damaged as a result of a ransomware attack. National Ink’s server and networked computers experienced a ransomware attack, which prevented National Ink from accessing the logos, designs and software that are stored on these servers.

Appellate Court Vacates Order Allowing Plaintiff’s Expert Access to Defendant’s ESI Prior to Privilege Determination: eDiscovery Case Law

eDiscovery Daily

In this claim of retaliatory dismissals from the defendant’s community college in violation of the North Carolina Whistleblower Protection Act, the plaintiffs served discovery requests on the defendants, including for ESI located in the school’s computers and servers. In Crosmun v.

AUSTRALIA: Assistance and Access Act, December 2018 – Holy grail of uncertainty created by new rushed-in data encryption laws

DLA Piper Privacy Matters

On 6 December 2018, the Australian Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018 (Cth) (the Act ) was rushed through both houses of Federal Parliament without amendment and received royal assent on 8 December 2018. Uncategorized Assistance and Access Act encryption intelligence gathering Investigatory Powers Act 2016 penalties telecommunications

Utah Governor Signs Electronic Data Privacy Bill Requiring Warrants to Access Certain Types of Data

Hunton Privacy

law to protect electronic information that individuals have shared with certain third parties. Representative Craig Hall, R-Utah, who introduced the bill, stated that the goal “is to provide the same protections we have in the physical world and apply those to the electronic world.” On March 27, 2019, Utah Governor Gary Herbert signed HB57, the first U.S.

HHS Releases Guidance on HIPAA and Cloud Computing

Hunton Privacy

Earlier this month, the Department of Health and Human Services’ Office for Civil Rights issued guidance (the “Guidance”) for HIPAA-covered entities that use cloud computing services involving electronic protected health information (“ePHI”). The Guidance also clarifies that CSPs do not fall within the conduit exception to the HIPAA Rules, because the conduit exception is limited to entities that transmit, and in the process only have transient access to, PHI.

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government. Information Security Online Privacy Cloud Computing Computer Fraud and Abuse Act Electronic Communications Privacy Act Microsoft

NIST Issues Guidelines on Security and Privacy in Public Cloud Computing

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) has issued draft Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144) (the “Guidelines”) for public comment. The Guidelines provide an overview of the security and privacy challenges pertinent to public cloud computing, and identify considerations for organizations outsourcing data, applications and infrastructure to a public cloud environment. Identity & Access Management.

With No Showing of Prejudice, Court Denies Spoliation Sanctions Against Defendant: eDiscovery Case Law

eDiscovery Daily

On October 29, 2018, defendant’s counsel sent an email to plaintiffs’ counsel instructing them about plaintiffs’ obligation to preserve data on all electronic media and lectured plaintiffs about their duty to preserve evidence in a subsequent email. In Mafille v. Kaiser-Francis Oil Co.,

FAQ Redux: Can a state agency destroy a paper original after scanning?

The Texas Record

While there is not an explicit paragraph in the rules stating that any record can be store electronically, in Section 6.92(4), And what are the requirements for keeping a record electronically now? FAQ Digitization electronic records eRecords scanning State Agencies

Hong Kong Regulator Imposes New Conditions to Regulate Outsourcing Arrangements for Cloud Storage

Data Matters

The Securities and Futures Commission of Hong Kong (SFC) issued new guidance to regulate the use of external electronic data storage providers (EDSPs 1 ) by licensed firms that intend to keep (or have previously kept) records or documents required to be maintained pursuant to the statutory recordkeeping rules and anti-money-laundering regime (Regulatory Records) in an online environment. Accessibility requirements. Asia Cloud Computing Cybersecurity

Despite Estimate of 37 Years to Crack iPhone, Government Doesn’t Have to Return it – Yet: eDiscovery Case Law

eDiscovery Daily

2019, a search warrant over a year earlier was issued for Morgan Management, LLC, which included search and seizure of “multiple servers, computers or storage media … including but not limited to … devices … associated with … Robert Morgan.”

Strategies to Protect your Records from Ransomware

The Texas Record

Once the criminals gain access to the system, they plant a virus, causing problems when trying to retrieve records from these systems. Ensure someone checks these backups regularly to ensure that they are accessible.

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

eDiscovery Daily

The defendant was also subject to the Oregon National Guard’s acceptable use policy and Employees of the Oregon National Guard, including the defendant, were required to sign the policy before they received computer access. Case Law Electronic Discovery Email Privacy

Court Sanctions Plaintiff for Spoliation of Facebook Account: eDiscovery Case Law

eDiscovery Daily

In a meeting between parties, the plaintiff was unsuccessful in accessing her Facebook account. Case Law Electronic Discovery Preservation Sanctions Social TechnologyShark Week on the Discovery Channel concludes this weekend, which means Case Week on the e Discovery Channel (a.k.a.,

According to the ABA, Lawyers are “Failing at Cybersecurity”: Cybersecurity Trends

eDiscovery Daily

Articles on cloud computing , cybersecurity and websites and marketing were released free online. The survey found that the most popular security measure being used by 35% of respondents was secure socket layers (SSL), which encrypt computer communications, including web traffic.

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

These controls include the following: Implement multifactor authentication: Multifactor authentication is widely lauded as the most effective control to detect and prevent unauthorized access. For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g.,

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

These controls include the following: Implement multifactor authentication: Multifactor authentication is widely lauded as the most effective control to detect and prevent unauthorized access. For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g.,

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

By that I mean, there just isn’t a clear path to accessible resources for the lawyer who wants to get a handle on the technology. Do they go to a community night course on computers? Electronic Discovery Ethics Evidence

New IRS Site Could Make it Easy for Thieves to Intercept Some Stimulus Payments

Krebs on Security

In this case, fraudsters would simply need to identify the personal information for a pool of Americans who don’t normally file tax returns, which may well include a large number of people who are disabled, poor or simply do not have easy access to a computer or the Internet.

IT 205

110 Nursing Homes Cut Off from Health Records in Ransomware Attack

Krebs on Security

A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States.

Understanding Blockchain and its Impact on Legal Technology, Part Two

eDiscovery Daily

Much speculation centered around the name being based on a setting in the 1996 movie Rising Sun; however, it was believed the true authors were several cryptography and computer science experts of non-Japanese descent. Blockchain Electronic Discovery Project Management

Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Krebs on Security

Section 8 involves the surreptitious installation of computer programs on computers or networks including malware and spyware.

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. Case Law Electronic DiscoveryIt’s that time of year again! Time for our annual review of eDiscovery case law! This is our ninth(!)

NASA warns of a significant increase in cyber attacks during Coronavirus outbreak

Security Affairs

Employes must be vigilant while accessing NASA systems, the agency is particularly concerned with nation-state actors that are carrying out Coronavirus-themed attacks. Refrain from opening your personal email or non-work related social media on your NASA computer systems/devices.

Despite Protective Order, Court Orders Plaintiff to Produce Source Code and Log File Printouts: eDiscovery Case Law

eDiscovery Daily

Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data. In Opternative, Inc.

Craig Ball’s Wayback Machine and Look at the Mueller Report: eDiscovery Best Practices

eDiscovery Daily

My first computer programming course (does anybody remember Fortran?) You can email them at info@completelegalkc.com to request access to the report and really search and examine it in detail. Electronic Discovery Production Redaction

Cellebrite 2019 Report on Industry Trends for Law Enforcement: eDiscovery Trends

eDiscovery Daily

The challenges to accessing digital data. Computers were a distant second at 52% , followed by CCTV (i.e., Electronic Discovery Industry Trends Mobile Devices

U.S. Supreme Court to Weigh in on Extraterritorial Search Warrant Dispute

Data Matters

The decision now under review held that electronic communications that are stored exclusively on foreign servers cannot be reached by U.S. provider that can access the foreign-stored information, and deliver it to U.S. officials, by using computers and personnel based in the United States. government’s contention that the Second Circuit’s approach eliminates “access to data necessary to advance important U.S. On October 16, 2017, the U.S.