Remove Communications Remove Computer and Electronics Remove e-Discovery Remove Security
article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

Reflecting on the Wannacry ransomware attack, which is the lesson learnt e why most organizations are still ignoring it. The dropper, once copied on the computer, attempted to connect to a site and only if the connection failed, proceeded to install two components, a cryptolocker and an exploit.

IT 100
article thumbnail

Indonesia Soon to Become the Fifth ASEAN Country to Adapt Data Privacy Laws

Security Affairs

On January 28th, Indonesia’s Ministry of Communication and Information Technology announced that the final draft for the Personal Data Protection Act has been submitted to the president of Indonesia. Data controllers are the parties that determine the purpose and control the processing of data such as e-commerce platforms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

When I spoke at the University of Florida E-Discovery Conference last month, there was a question from the live stream audience about a lawyer’s duty to disclose a data breach within his or her law firm. Please remove all laptops from docking stations & keep turned off. *No No exceptions*. And, Model Rule 1.4

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. NON-PARTY DISCOVERY. Here are six cases last year where courts decided on non-party discovery requests: Court Denies Non-Party’s Request to Quash Subpoena in Telecommunications Dispute : In Fair v.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Sweet, among other rulings, issued an adverse inference sanction against one of the defendants for its failure to preserve text messages in the possession of a non-party, finding that defendant had control of the non-party’s text messages, given that he was contracted by the defendant and provided documents and gave a deposition during discovery.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Historically, the scope of discovery under Rule 26 of the Federal Rules of Civil Procedure and its state law analogues was defined exclusively in terms of relevance, with privilege providing but a narrow exception. To be within the scope of discovery, an inquiry now must be both relevant and proportional.

Privacy 97
article thumbnail

Craig Ball of Craig D. Ball, PC: eDiscovery Trends 2018

eDiscovery Daily

A frequent court appointed special master in electronic evidence, Craig is a prolific contributor to continuing legal and professional education programs throughout the United States, having delivered over 2,000 presentations and papers. Mobile serves as their principal means to access online resources, business resources, and communicate.