Remove 12
Remove 2017 Remove Communications Remove Computer and Electronics Remove Tools
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

????????Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Tools, methods, automation, and no BS. Bruce Schneier | @schneierblog. Street @jaysonstreet.

article thumbnail

German court: monitoring of employees by key logger is not allowed

Data Protection Report

The German federal labor court held in a recent decision ( Bundesarbeitsgericht , 27 July 2017 – case no. Subsequently, the firm installed key logger software on its employees’ computers. Norton Rose Fulbright has been shortlisted for ‘Cyber law firm of the year’ at the Insurance Insider Cyber Ranking Awards 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Protection of personal privacy has, consequently, become an important goal both in technological development — e.g., the increasing prevalence of “privacy by design” in communications programs such as “ephemeral” messaging systems — and in governmental regulation. 25 Showing good cause was (and is) often difficult in contested matters.26

Privacy 97
article thumbnail

Finding the treasure in governement information management

CILIP

At the start of the Grenfell Tower inquiry in 2017 we shared some of our material with a third party linked to the Public Inquiry. Non-Corporate Communications The subsequent differences in approaches to KIM mean big differences in attitudes to technology. “We Technology has revolutionised sharing, but it brings new challenges. “At

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

During a normal monitoring activity, one of the detection tools hits a suspicious email coming from the validtree.com domain. The domain validtree.com is registered through namecheap.com on 2017-12-07T15:55:27Z but recently renewed on 2019-10-16T05:35:18Z. I am a computer security scientist with an intensive hacking background.

article thumbnail

Ralph Losey of Jackson Lewis, LLP: eDiscovery Trends 2018

eDiscovery Daily

They just don’t have a good tool for that yet. In that case, Uber was basically conducting a lot of their communications through self-destruct software that only keeps it for a brief period. They appear to have been using secret self-destruct communications to hide this activity. Uber case out of San Francisco.

article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. To date, the Commission has adopted 12 such decisions. The tools available to individual data controllers, including small businesses, are bureaucratic and would be vulnerable to legal challenges.

GDPR 120