Electronic Records, Third-Party Systems, and Contracts

The Texas Record

Take a moment to think about the systems your local government or agency uses to manage its electronic records. What would your ideal Electronic Document and Records Management System (EDRMS) look like? (Authors: Maria Freed and Sarah Swanson). Content Disclaimer.

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Most of us, by now, take electronic signatures for granted. Yet electronic signatures do have their security limitations. As digital transformation has quickened, it has become clear that electronic signatures are destined to become even more pervasively used to conduct business remotely. The workflows involved with issuing and managing certificates are all automated and get executed in the cloud. Related: Why PKI will endure as the Internet’s secure core.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Metadata Requirements for Permanent Electronic Records in the Cloud

National Archives Records Express

If you have Federal records in the cloud, additional metadata might need to be applied to maintain relational links between records stored in the cloud and in local storage. You should assess metadata requirements before records are transferred to or created in the cloud. Also, the contract between the agency and the cloud service provider should include minimum metadata requirements. NARA Bulletin 2010-05 : Guidance on Managing Records in Cloud Computing Environments.

Calculating electronic records storage costs

The Schedule

This post will do the same for electronic records and follows the same formula of not taking into account personnel or overhead costs or depreciation of equipment. Calculating the costs for storing your electronic records on premise will largely depend on the size of your organization.

New Rules Announced for Border Inspection of Electronic Devices

Threatpost

Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

Keeping up with Quantum Technology | Quantum Computing

Everteam

While everyone is digging deep into the Artificial Intelligence, Machine Learning, Blockchain and many other new digital transformation phenomena, Quantum Computing has been transformed from theory to reality. Listed under one of the ten strategic technology trends for 2019 according to Gartner, Quantum Computing has been grabbing the headlines. Let’s move to how it’s related to computers. What is Quantum Computing? Quantum Computing quantum computing

Hong Kong Regulator Imposes New Conditions to Regulate Outsourcing Arrangements for Cloud Storage

Data Matters

The Securities and Futures Commission of Hong Kong (SFC) issued new guidance to regulate the use of external electronic data storage providers (EDSPs 1 ) by licensed firms that intend to keep (or have previously kept) records or documents required to be maintained pursuant to the statutory recordkeeping rules and anti-money-laundering regime (Regulatory Records) in an online environment. 2 Circular to Licensed Corporations – Use of external electronic data storage (October 31, 2019).

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government. Information Security Online Privacy Cloud Computing Computer Fraud and Abuse Act Electronic Communications Privacy Act Microsoft

NIST Issues Guidelines on Security and Privacy in Public Cloud Computing

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) has issued draft Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144) (the “Guidelines”) for public comment. The Guidelines provide an overview of the security and privacy challenges pertinent to public cloud computing, and identify considerations for organizations outsourcing data, applications and infrastructure to a public cloud environment.

RIM-brain in Movies and TV

The Texas Record

K-2SO was then able to login to the computer system in the Scarif base. When the forests on their home planet were cut down to produce paper for books, over a trillion dust aliens came to live on The Library, overwhelming the ability for computers to accurately record their numbers.

ROT 63

FAQ: How does web archiving fit into records management?

The Texas Record

Records Management for Blogs, Texts, Social Media, Cloud Computing and more! Web archiving involves using software to take periodic snapshots to preserve as much data as you need about your organization’s website, including any associated metadata.

Utah Governor Signs Electronic Data Privacy Bill Requiring Warrants to Access Certain Types of Data

Hunton Privacy

law to protect electronic information that individuals have shared with certain third parties. Representative Craig Hall, R-Utah, who introduced the bill, stated that the goal “is to provide the same protections we have in the physical world and apply those to the electronic world.” State Law Cloud Congress Internet Personal Data Trump Administration UtahOn March 27, 2019, Utah Governor Gary Herbert signed HB57, the first U.S.

Cloud document control software and volunteers help nonprofit positively impact society

Document Imaging Report

A nonprofit blood bank in Florida is utilizing DocuWare Cloud to store donor records and standard operating procedures manuals. SunCoast decided to look for a cloud document management solution because of their small IT staff and budget. After researching alternatives to paper files, SunCoast decided to work with their Authorized DocuWare Partner, who got them up and running with DocuWare Cloud. Contributed News healthcare channel Cloud ECM

An Early Recap of Privacy in 2020: A US Perspective

Data Matters

The CJEU did not so much as ask whether any EU member state has an oversight body to examine and judge the privacy or civil rights implications of electronic surveillance the way PCLOB and Foreign Intelligence Surveillance Court do — with full national security clearance to access the deepest secrets of signals intelligence. communications service providers to produce the contents of electronic communications they store outside the United States in response to U.S.

Episode 208: Getting Serious about Hardware Supply Chains with Goldman Sachs’ Michael Mattioli

The Security Ledger

In this week’s Security Ledger Podcast, sponsored by Trusted Computing Group, we’re talking about securing the hardware supply chain. In this week’s Security Ledger Podcast, sponsored by Trusted Computing Group, we’re talking about securing the hardware supply chain.

Public or Private Isn’t the Only Question You Should be Asking about Cloud Solutions: eDiscovery Best Practices

eDiscovery Daily

In yesterday’s post detailing the discussion of industry experts regarding the adoption of cloud technology within the legal industry, several points of discussion were discussed, including the differentiation between “public cloud” and “private cloud”. But, public or private cloud isn’t the only question you should be asking about a cloud solution. Well, that holds true for cloud solutions as well.

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

The Security Ledger

In this Spotlight Edition of The Security Ledger Podcast, sponsored by Trusted Computing Group (TCG), we’re joined by Intel Fellow Claire Vishik to talk about the evolving concept of online “trust.” Claire Vishik, Intel Fellow & Director, Trusted Computing Group.

Why Are Businesses Opting for Edge, AI, and IoT – and Are They Wise to Do So?

ARMA International

Edge computing is increasingly associated with at least two “trending” terms in the IT and information arenas: Internet of Things (IoT) and artificial intelligence (AI). Broadly speaking, the term refers to computing that’s done at or near the source of the data. Today, a great percentage of data is stored in the cloud and may therefore be located continents away.

If You’re a Cloud Provider or Consumer, Consider These Guidelines on How to Conduct Yourself in Europe: eDiscovery Best Practices

eDiscovery Daily

While we were preparing to eat turkey and stuff ourselves with various goodies last week, the Cloud Security Alliance (CSA) provided an important guideline for compliance with the European Union General Data Protection Regulation (GDPR). As part of the release, the CSA also launched the CSA GDPR Resource Center , a new community-driven website with tools and resources to help educate cloud service providers and enterprises on the new GDPR.

GDPR 35

U.S. Supreme Court to Weigh in on Extraterritorial Search Warrant Dispute

Data Matters

The decision now under review held that electronic communications that are stored exclusively on foreign servers cannot be reached by U.S. officials, by using computers and personnel based in the United States. Cloud Computing European Union International Litigation Online PrivacyOn October 16, 2017, the U.S. Supreme Court granted the U.S.

CloudNine Announces Acquisition of ESI Analyst

eDiscovery Daily

HOUSTON, TX – August 25, 2021 – Today, eDiscovery technology leader CloudNine announced the acquisition of ESI Analyst , the emerging standard for modern file types such as mobile, chat, social media, text, computer activity, financial data, and more. Electronic Discovery News eDiscovery SoftwareeDiscovery industry standard for processing traditional data types acquires leader of emerging standard for modern data discovery to integrate platforms and enhance customer value.

Bomb Threat, Sextortion Spammers Abused Weakness at GoDaddy.com

Krebs on Security

But as he began digging deeper, Guilmette came to the conclusion that the spammers were exploiting an obscure — albeit widespread — weakness among hosting companies, cloud providers and domain registrars that was first publicly detailed in 2016. Amazon Web Services Cisco Talos Digital Ocean DNS GoDaddy Google Cloud Matthew Bryant mozilla firefox Mozilla Foundation Ron Guilmette Spammy Bear

Nuxeo Announces Strong Revenue Growth and Continued Product Innovation

Document Imaging Report

NEW YORK, August 26, 2020 — Nuxeo , the leading cloud-native Content Services Platform, today announced several notable growth benchmarks, including 33 percent year-over-year (YOY) revenue growth for the first half of 2020, and 36 percent YOY revenue growth for the second quarter of 2020.

FAQ Redux: Can a state agency destroy a paper original after scanning?

The Texas Record

While there is not an explicit paragraph in the rules stating that any record can be store electronically, in Section 6.92(4), 4), the definition of an electronic state record references Government Code, Section 441.189(a), which states: Any state record may be created or stored electronically in accordance with standards and procedures adopted as administrative rules of the commission. And what are the requirements for keeping a record electronically now?

Microsoft Dynamics 365 Finance & Operations – Deployment options

Ascent Innovations

You can now deploy Microsoft Dynamics 365 for Finance and Operations in the cloud or on-premises. Cloud deployments offer a software system that is fully managed by Microsoft, while on-premises deployments as name suggests, are deployed locally within a customer’s data center. Important: On-premises deployments of Microsoft Dynamics 365 for Finance and Operations are NOT supported on any public cloud infrastructure, including Azure. Why cloud.

Potential Congressional Action on Cross Border Data? A Primer on the CLOUD Act

Data Matters

In recent years, the rise of cloud computing has led to more and more data being stored somewhere other than the jurisdiction in which it was created. Against this backdrop, bipartisan groups of Senators and Representatives have recently introduced the Clarifying Lawful Overseas Use of Data, or “CLOUD” Act, which seeks to support the needs of law enforcement while advancing international comity on privacy rights. Cloud Computing International Legislation Policy

California Passes New Digital Privacy Law

Hunton Privacy

On October 8, 2015, California Governor Jerry Brown signed into law the California Electronic Communications Privacy Act (“CalECPA”). The law requires police to obtain a warrant before accessing an individual’s private electronic information, such as text messages, emails, GPS data and online documents that are stored in the cloud and on smartphones, tablets, computers and other digital devices. State Law California Cloud Electronic Communications Privacy Act Wiretap

A short history of intranets and what's next with social, mobile and cloud

ChiefTech

Some where along the way intranets parted way, but the trinity of social, mobile and cloud is bringing them back together again. What does social, mobile and cloud mean for intranets? The popularity of the World Wide Web also helped to drive the eventual dominance of the Internet Protocol (IP) stack over other proprietary networking protocols, so both the Internet and private computer networks ended up using the same basic technologies for connecting systems and computers together.

Foreign hackers breached Russian federal agencies, said FSB

Security Affairs

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies. Cloud associated with account sewn into the sample. All communication takes place using the Cloud API Mail.ru” states the report.

Cloud 105

Simon Says – Once, Twice, Three Times a Spoliator: eDiscovery Case Law

eDiscovery Daily

Despite that, as the opinion noted, Schulton had previously acknowledged that he used a “mechanism called Take Out” to export his entire ScholarChip e-mail account, which included all of its contents dating back to 2014, to Schulton’s personal “One Drive” cloud storage account. He also saved a copy of his ScholarChip email account on his personal computer. Case Law Electronic Discovery Preservation Sanctions

The Sedona Conference Has an Updated Commentary on Rule 45 Subpoenas to Non-Parties: eDiscovery Best Practices

eDiscovery Daily

Last week, The Sedona Conference® (TSC) and its Working Group 1 on Electronic Document Retention & Production (WG1) announced the publication of the Public Comment Version of The Sedona Conference Commentary on Rule 45 Subpoenas to Non-Parties, Second Edition.

According to the ABA, Lawyers are “Failing at Cybersecurity”: Cybersecurity Trends

eDiscovery Daily

Articles on cloud computing , cybersecurity and websites and marketing were released free online. The survey found that the most popular security measure being used by 35% of respondents was secure socket layers (SSL), which encrypt computer communications, including web traffic. BTW, the Legal Technology Resource Center of the ABA used to have a publicly available page with Cloud Ethics Opinions Around the U.S., Electronic Discovery Privacy Security

Ignoring Internet of Things Devices Could Be IdIoTic: eDiscovery Trends

eDiscovery Daily

You want to know what’s on the hard drive of the device, but they are typically connected to the internet and cloud. … Earlier this month, the Cloud Security Alliance (CSA) announced the release of the CSA IoT Controls Framework , its first such framework for IoT which introduces the base-level security controls required to mitigate many of the risks associated with an IoT system operating in a range of threat environments. Electronic Discovery Industry Trends

IoT 44

When Litigation Hits, The First 7 to 10 Days is Critical: eDiscovery Throwback Thursdays

eDiscovery Daily

When a case is filed (or even before, if litigation is anticipated then), several activities must be completed within a short period of time (often as soon as the first seven to ten days after filing) to enable you to assess the scope of the case, where the key electronically stored information (ESI) is located and whether to proceed with the case or attempt to settle with opposing counsel. Collection Electronic Discovery Identification Preservation

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. I will be moderating a panel of eDiscovery experts that includes Mike Quartararo , Founder and Managing director of eDPM Advisory Services and author of the 2016 book Project Management in Electronic Discovery; Robert D. Electronic Discovery Industry Trends Information GovernanceIt’s here!

German DPAs Issue Joint Position Paper on Alternatives to Safe Harbor

Hunton Privacy

or other third countries should also use as guidance the German DPAs’ March 2014 resolutions on “Human Rights and Electronic Communication” and the October 2014 guidelines on “Cloud Computing.”. European Union Information Security International Adequacy Article 29 Working Party Binding Corporate Rules Cloud Computing Compliance Consent Cross-Border Data Flow Data Protection Authority Data Transfer European Commission Germany Personal Information Safe Harbor

Craig Ball is “That Guy” Who Keeps Us Up to Date on Mobile eDiscovery Trends: eDiscovery Best Practices

eDiscovery Daily

Craig did acknowledge that because Android backups live in the cloud, he anticipates that, at first, there will be no means to download the complete Android backup to a PC for analysis, thus requiring restoring the data to a factory-initialized “clean” phone as a means to localize the data for collection (at least until Google hopefully provides a suitable takeout mechanism). Electronic Discovery Mobile DevicesSo many topics, so little time (again).

A Strategic Storage Plan Lays the Groundwork for Digital Transformation

InfoGoTo

Commodity hardware, cloud computing, low-cost storage and open-source software have put powerful capabilities within everyone’s reach. Thanks to recent advances in machine learning, however, computers can now learn and extract the data from scanned documents and structure it for record-keeping and analysis. It can start with a management directive that all information be created and stored electronically whenever possible going forward. Consider the Cloud.

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Related: How Multi Party Computation is disrupting encrypti on An accomplished violinist, Einstein, no doubt, appreciated the symmetry of his metaphor. Our top math geniuses point to iO as a cornerstone needed to unleash the full potential of artificially intelligent (AI) programs running across highly complex and dynamic cloud platforms, soon to be powered by quantum computers.

Cellebrite 2019 Report on Industry Trends for Law Enforcement: eDiscovery Trends

eDiscovery Daily

Computers were a distant second at 52% , followed by CCTV (i.e., The report contains many more stats, including percentage of cases involving data from cloud sources, time spent reviewing various sources of data, time spent on reporting and caseloads, among other things. Electronic Discovery Industry Trends Mobile DevicesAs I’ve been saying for a while now and will be discussing with Tom O’Connor in our webcast on April 24, discovery isn’t just for litigation anymore.