article thumbnail

Simon Says – Once, Twice, Three Times a Spoliator: eDiscovery Case Law

eDiscovery Daily

Despite that, as the opinion noted, Schulton had previously acknowledged that he used a “mechanism called Take Out” to export his entire ScholarChip e-mail account, which included all of its contents dating back to 2014, to Schulton’s personal “One Drive” cloud storage account. Judge’s Ruling.

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 - 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a burglar stealing valuables such as jewelry, cash, electronics, and equipment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There is also less hardware and compute power to work in your typical IoT device when compared to traditional devices, so embedding security becomes a matter of choice, rather than necessity. Think about IoT devices and the components within them, such as electronic control units (ECU) and the gateways that aggregate and transfer data.

IoT 77
article thumbnail

Understanding IoT Security Challenges – An Interview with an Industry Expert

Thales Cloud Protection & Licensing

IoT devices typically have a small memory and a rudimentary operating system with no real user interface, and that presents a challenge as they have limited power, communication, and computing capabilities. An important and challenging part of the product lifecycle is to maintain a device’ trusted identity.

IoT 92
article thumbnail

Regulating Privacy Across Borders in the Digital Age

Hunton Privacy

On November 10, 2010, the American Bar Association’s Section of Antitrust Law’s International Committee and Corporate Counseling Committee hosted a webinar on “Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference?”.

Privacy 40
article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Three

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Browning Marean and I spent years trying to begin a law school curriculum that included computer education with no success. Some commentators say this isn’t really necessary because the new generation is computer savvy.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. The only difference now is that it may exist in cloud-based systems.