Remove about
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Another common name for the IoB is embodied computing , where the human body is used as a technology platform. Wearable technology began as any kind of electronic device designed to be worn on the user’s body. In the ingestibles category are Bluetooth electronic pills that monitor the inner workings of the human body.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

These undertakings require planning, communication, documentation, and collaboration to be successful. I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. Covering all computers and file cabinets in plastic sheeting. . Stabilizing or Moving.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

This story is about the victims of a particularly aggressive business ID theft ring that’s spent years targeting small businesses across the country and is now pivoting toward using that access for pandemic assistance loans and unemployment benefits. . For the past several months, Milwaukee, Wisc. ” PHANTOM OFFICES. .

article thumbnail

Do’s and Don’ts of Text Message Discovery

eDiscovery Daily

Emails were the primary concern since they held the bulk (if not all) of business communications. Corporate servers stored the data, regardless of how the email was sent or received (via mobile device or work computer). 1] In 2015, research showed that 80% of professionals conducted business communications through texts.

article thumbnail

Podcast Episode 119: EFF on Expanding Researchers Rights and AT&T talks IoT Security Fails

The Security Ledger

In this episode of the podcast, #119: Electronic Frontier Foundation General Counsel Kurt Opsahl joins us to talk about the Coders’ Rights Project. Also: we speak with Senthil Ramakrishnan, a lead member of AT&T’s IoT Security group about that company’s plans to work with Ericsson to certify the security of IoT devices.

IoT 40
article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

When I spoke at the University of Florida E-Discovery Conference last month, there was a question from the live stream audience about a lawyer’s duty to disclose a data breach within his or her law firm. requires that an attorney keep the client “reasonably informed about the status of the matter.”. No exceptions*. And, Model Rule 1.4

article thumbnail

German court: monitoring of employees by key logger is not allowed

Data Protection Report

In the case, the employer informed its employees generally about the implementation of a new network system and logging all Internet traffic and the use of their systems. Subsequently, the firm installed key logger software on its employees’ computers.