What Happens to Electronic Records in the Archives?

The Texas Record

The Archives and information services division at the Texas State Library and Archives Commission (TSLAC) has a sophisticated electronic records processes. The audience had the chance to get an in-depth look into the process of preserving an electronic records.

CryptoAgility to take advantage of Quantum Computing

Thales Cloud Protection & Licensing

CryptoAgility to take advantage of Quantum Computing. What is quantum computing and what changes will it bring? You’d probably do the computation a few times, supplemented by further checking using a classical computer, to make sure you arrive at the same result).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What Happens to Electronic Records in the Archives?

The Texas Record

The Archives and information services division at the Texas State Library and Archives Commission (TSLAC) has a sophisticated electronic records processes. During E-records 2020 Brian Thomas, an Electronic Records Specialist at TSLAC, presented “What Happens Electronic Records Sent to the State Archives?” The audience had the chance to get an in-depth look into the process of preserving an electronic records.

RCE flaw in Electronic Arts Origin client exposes gamers to hack

Security Affairs

Electronic Arts (EA) has fixed a security issue in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts (EA) has addressed a vulnerability in the Windows version of its gaming client Origin that allowed hackers to remotely execute code on an affected computer. Electronic Arts already released a security patch for the remote code execution vulnerability.

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

eDiscovery Daily

At Appellant’s apartment, after the agents discovered a single computer, an HP Envy 700 desktop, which was encrypted with TrueCrypt, Appellant informed the agents that he lived alone, that he was the sole user of the computer, and that only he knew the password to his computer.

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. Call that the first incarnation of CES – literally, electronics for consumers. But starting in the mid to late 1908s, a brash new industry was starting to take over the “buzz” on the show floor – personal computers. Stephen Wolfram has even announced a computable database of “connected devices.”

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

Thales Cloud Protection & Licensing

Preparing for Data Security in the Quantum Computing Era. Each passing day brings the world closer to the exciting reality of powerful quantum computing. Weather prediction, air traffic control, urban planning, defense strategies, medical research and so much more will be affected by the new era of computing power in ways we can’t even yet predict. Quantum computing is a threat to public key infrastructure and security systems that rely on it.

FAQ: How does web archiving fit into records management?

The Texas Record

Records Management for Blogs, Texts, Social Media, Cloud Computing and more! Web archiving involves using software to take periodic snapshots to preserve as much data as you need about your organization’s website, including any associated metadata.

Maryland Court Finds Coverage for Lost Data and Slow Computers After Ransomware Attack

Hunton Privacy

As previously posted on our Hunton Insurance Recovery blog , a Maryland federal court awarded summary judgment to policyholder National Ink in National Ink and Stitch, LLC v. State Auto Property and Casualty Insurance Company , finding coverage for a cyber attack under a non-cyber insurance policy after the insured’s server and networked computer system were damaged as a result of a ransomware attack. State Auto denied coverage for the cost of replacing the computer system.

This is the old ChiefTech blog.: The Circle of Computing Life

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. Nice of you to drop in and visit.

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Malware, a combination of the terms ‘malicious’ and ‘software,’ includes all malicious programs that intend to exploit computer devices or entire network infrastructures to extract victim’s data, disrupt business operations, or simply, cause chaos. There’s no definitive method or technique that defines malware; any program that harms the computer or system owners and benefits the perpetrators is malware. Computer Viruses. Computer worms.

This is the old ChiefTech blog.: Explosion of electronic touch points

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Wednesday, 31 January 2007 Explosion of electronic touch points I received an email today from someone and, as you typically find in a business email, the senders signature block included their contact details. Nice of you to drop in and visit.

Episode 208: Getting Serious about Hardware Supply Chains with Goldman Sachs’ Michael Mattioli

The Security Ledger

In this week’s Security Ledger Podcast, sponsored by Trusted Computing Group, we’re talking about securing the hardware supply chain. In this week’s Security Ledger Podcast, sponsored by Trusted Computing Group, we’re talking about securing the hardware supply chain.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

In this blog series, TSLAC analysts highlight and extol the virtues of their favorite record series. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

In this blog series, TSLAC analysts highlight and extol the virtues of their favorite record series. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

Later in that decade, Frederick Terman returned to Stanford from Harvard as dean of the engineering school and encouraged the development of electronics in local businesses. In 1951, Terman went on to become the founder of the 660-acre Stanford Industrial Park (later named Stanford Research Park), which blossomed as electronic and technology companies signed long-term leases to make the Stanford Industrial Park their home. For technologists Guest Blog Post Top Stories

With No Showing of Prejudice, Court Denies Spoliation Sanctions Against Defendant: eDiscovery Case Law

eDiscovery Daily

McCarthy, finding that the plaintiffs “have not demonstrated they have been prejudiced” by the loss of the plaintiff former employee’s work computer, denied the plaintiffs’ motion for sanctions “without prejudice to reassertion of the motion if through discovery it is determined that some specific evidence is beyond Plaintiffs’ reach” for the defendant’s “clear failure” to preserve the computer. Case Law Electronic Discovery Preservation SanctionsIn Mafille v.

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

eDiscovery Daily

The defendant was also subject to the Oregon National Guard’s acceptable use policy and Employees of the Oregon National Guard, including the defendant, were required to sign the policy before they received computer access. Case Law Electronic Discovery Email Privacy

This is the old ChiefTech blog.: Are Wikipatterns, Collaborative Patterns?

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. In terms of enterprise social computing, wikis continue to be the flavour of the month and Stewart Mader taps into that interest with his new Wikipatterns book , the name reflecting the Wikipatterns site that he helped to start.

An Early Recap of Privacy in 2020: A US Perspective

Data Matters

The CJEU did not so much as ask whether any EU member state has an oversight body to examine and judge the privacy or civil rights implications of electronic surveillance the way PCLOB and Foreign Intelligence Surveillance Court do — with full national security clearance to access the deepest secrets of signals intelligence. communications service providers to produce the contents of electronic communications they store outside the United States in response to U.S.

Hong Kong Regulator Imposes New Conditions to Regulate Outsourcing Arrangements for Cloud Storage

Data Matters

The Securities and Futures Commission of Hong Kong (SFC) issued new guidance to regulate the use of external electronic data storage providers (EDSPs 1 ) by licensed firms that intend to keep (or have previously kept) records or documents required to be maintained pursuant to the statutory recordkeeping rules and anti-money-laundering regime (Regulatory Records) in an online environment. 2 Circular to Licensed Corporations – Use of external electronic data storage (October 31, 2019).

Who Is Infosource? An Interview With Johann Hoepfner About Printing, Capture, and More

Document Imaging Report

I started to understand bigger printers and bigger computers. Infosource back then had just switched from printed reports to electronic and Web-based data delivery. ” For us, that was a step back from an electronic to a paper-based “workflow” .

Friday the 13th is Unlucky for the City of New Orleans. Almost. Maybe.: Cybersecurity Trends

eDiscovery Daily

” As a precautionary measure, the NOLA tweet confirmed, the city’s IT department gave the order for all employees to power down computers and disconnect from Wi-Fi. Electronic Discovery Security

Friday Squid Blogging: New SQUID

Schneier on Security

The atomtronic Superconducting QUantum Interference Device (SQUID) is also potentially useful for ultrasensitive rotation measurements and as a component in quantum computers. "In We use neutral atoms rather than charged electrons. Read my blog posting guidelines here.

Web Teleconferencing Solutions Experiencing Challenges During COVID-19 Crisis: eDiscovery Logistics

eDiscovery Daily

CloudNine uses RingCentral (which is built on Zoom) and I have noticed a couple of issues dialing into meetings this week, but was able to circumvent them by using computer audio instead. Electronic Discovery Industry Trends

Why Process in eDiscovery? Isn’t it “Review Ready”?: eDiscovery Best Practices

eDiscovery Daily

As I’ll point out in tomorrow’s blog post (spoiler alert!), Craig, who introduced the new primer in his latest blog post – the 200th of his excellent Ball in Your Court blog – asked the questions posed in the title of this post in the beginning of that primer (after the Introduction) and confronts a myth that many attorneys believe with regard to electronic files and how easily(and quickly) they can be made ready for production. Electronic Discovery Processing

My Love for What I Do: eDiscovery Love Story

eDiscovery Daily

Most people know me because of the blog, and you have to love eDiscovery to write about it every day. I once wrote an article about CAR systems back in the mid-80s – Computer Assisted (microfilm) Retrieval (good luck finding that article today) – and it seemed like the wave of the future back then. Today, of course, I write (most) every day for this blog and, while it can sometimes be a bit of a burden, it also pays considerable personal benefits. It’s Valentine’s Day!

This is the old ChiefTech blog.: Currently in Singapore

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. Wednesday, 21 March 2007 Currently in Singapore Im currently in Singapore with no time to blog really, respond to comments or even keep up with my RSS feeds. Well see "electronically" again. sorry to have hogged your blog like this.

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

In this episode of The Security Ledger podcast (#128): you're going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure? And do security and privacy have a seat at the table at the world's largest electronics event? And do security and privacy have a seat at the table at the world’s largest electronics event?

Despite Estimate of 37 Years to Crack iPhone, Government Doesn’t Have to Return it – Yet: eDiscovery Case Law

eDiscovery Daily

2019, a search warrant over a year earlier was issued for Morgan Management, LLC, which included search and seizure of “multiple servers, computers or storage media … including but not limited to … devices … associated with … Robert Morgan.”

Court Orders Defendants to Produce Laptop for Forensic Examination – Again: eDiscovery Case Law

eDiscovery Daily

Kutsomarkos provided pdf versions of documents from the laptop…However, the pdf files scrubbed the metadata from the documents and that metadata should be available on the hard drives…Also, the computer in Garrett was a personal computer, but here the computer was Ms.

The Sedona Conference Has an Updated Commentary on Rule 45 Subpoenas to Non-Parties: eDiscovery Best Practices

eDiscovery Daily

Last week, The Sedona Conference® (TSC) and its Working Group 1 on Electronic Document Retention & Production (WG1) announced the publication of the Public Comment Version of The Sedona Conference Commentary on Rule 45 Subpoenas to Non-Parties, Second Edition.

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

of Williams Mitchell and originally published in the 2019 Winter edition of The Arkansas Lawyer and republished on JD Supra (The Lawyer’s Duty When Client Confidential Information is Hacked From the Law Firm, hat tip to Sharon Nelson’s terrific Ride the Lightning blog for the reference ) takes a look at a lawyer’s duties following a data breach and discusses the requirements of ABA Formal Opinion 483 , which was issued in October 2018. Electronic Discovery Security

Twenty-One Points, Less Than 350 Words: eDiscovery Best Practices

eDiscovery Daily

As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). With regard to the Georgetown E-Discovery Training Academy, Craig notes (as he did in our blog post covering the coming Academy) that no member of the Academy faculty is compensated and that they are all volunteers.

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

that we’re happy to share on the eDiscovery Daily blog. Do they go to a community night course on computers? To that list I’d add eDiscovery Daily , the Association of Certified eDiscovery Specialists (ACEDS) blog and of course Craig Ball’s Ball in your court blog. Beyond that, I’d also suggest the following books which are worth consulting as well: A Process of Illumination: The Practical Guide To Electronic Discovery , Mary Mack (available on Amazon here ).

Simon Says – Once, Twice, Three Times a Spoliator: eDiscovery Case Law

eDiscovery Daily

He also saved a copy of his ScholarChip email account on his personal computer. He also saved electronic copies of several webinars with the plaintiff’s clients to his personal computer, which he took with him and kept after he left ScholarChip’s employment. Judge Simon summed up the spoliation, as follows: “The Private Client List, the ScholarChip emails, and the webinar recordings are all electronically stored information.

This is the old ChiefTech blog.: Integrating Enterprise 2.0 into your corporate Intranet - 20th September

ChiefTech

This is the old ChiefTech blog. However, you need to come over and see my new blog at chieftech.com.au. ©2005-2009. Disclaimer: Information on this blog is of a general nature and represents my own independent opinion. opportunities and challenges; The technology building blocks: Blogs, RSS, tags, search and wikis; and Implementation approaches: Nature or nurture? 5:59 PM Post a Comment Note: Only a member of this blog may post a comment.

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., The post Fund Managers Targeted in Sophisticated Cyberattacks appeared first on Data Matters Privacy Blog. Asia Computer Crimes Cybersecurity Data Breaches Financial Privacy Information Security International SEC

Fund Managers Targeted in Sophisticated Cyberattacks

Data Matters

For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., The post Fund Managers Targeted in Sophisticated Cyberattacks appeared first on Data Matters Privacy Blog. Asia Computer Crimes Cybersecurity Data Breaches Financial Privacy Information Security International SEC

Court Declines to Order Plaintiff to Produce Cell Phone in Employment Discrimination Case: eDiscovery Case Law

eDiscovery Daily

34(a):[8], which stated (in part): “Inspection or testing of certain types of electronically stored information or of a responding party’s electronic information system may raise issues of confidentiality or privacy… Courts should guard against undue intrusiveness resulting from inspecting or testing such systems.”. Case Law Electronic Discovery Mobile Devices ProductionIn Santana v. MKA2 Enterprises, Inc., 18-2094-DDC-TJJ (D. 8, 2019) , Magistrate Judge Teresa J.