Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. I am continuously amazed by how bad electronic voting machines are. Yes, they're computers.

Metadata Requirements for Permanent Electronic Records in the Cloud

National Archives Records Express

Metadata are records that need to be managed and retrievable These NARA Bulletins provide further records management guidance for agencies on the topic of metadata and cloud computing: NARA Bulletin 2015-04 : Metadata Guidance for the Transfer of Permanent Electronic Records. NARA Bulletin 2010-05 : Guidance on Managing Records in Cloud Computing Environments. General cloud cloud computing electronic records management metadata

New Rules Announced for Border Inspection of Electronic Devices


Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

Syrian Electronic Army Members Indicted for Conspiracy

Dark Reading

Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army


Surging Samsung Electronics takes Intel's chipmaking crown

Information Management Resources

The firm has transformed itself from a maker of cheap televisions into a pervasive supplier of key components in smartphones and other modern computing devices and memory chips. Hardware and software Intel Samsung

The Four Phases of CES: I, Consumer, Am Electronic

John Battelle's Searchblog

The post The Four Phases of CES: I, Consumer, Am Electronic appeared first on John Battelle's Search Blog. Call that the first incarnation of CES – literally, electronics for consumers. Stephen Wolfram has even announced a computable database of “connected devices.”

Judge Recommends Sanctions for Defendant Under FRCP 37(e)(1): eDiscovery Case Law

eDiscovery Daily

One of the plaintiff’s alleged harassers left the company a mere two days after that, but his computer was wiped within 7 days of his last day at work. Noting that the “failure to preserve electronic evidence is covered by Fed.R.Civ.P. In Franklin v. Howard Brown Health Ctr.,

EU to force tech firms to hand over terror suspects' messages

The Guardian Data Protection

Under the plans, judges in one member state will be able to seize electronic evidence held on a service provider in another European country through a transnational European production order. European Union Digital media Europe UK security and counter-terrorism Counter-terrorism policy Social media Politics UK news Privacy Police Brexit Telecommunications industry Data and computer security Data protection

This is the old ChiefTech blog.: The Circle of Computing Life


Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. Its a particularly unusual story, because the idea for the computer in question emerged in the first half of the last century on the back of early management thinking (particularly scientific management) and the needs of Joseph Lyons and Co. This is the old ChiefTech blog.

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems.

IT 223

Hard Drive Health: Top 10 Maintenance Tips

Record Nations

Computers are often one of a business’s most valuable tools and protecting their hard drives and the important information and software they store is crucial. Electronic Document Management

GDPR and The Data Governance Imperative


The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information.

Strategies to Protect your Records from Ransomware

The Texas Record

Backup your information: Your data should be backed up in multiple locations, primarily in locations where it is not constantly connected to the computer or network. These viruses attack electronic records in various forms such as Word Document, email, Excel Spreadsheet, etc.

How natural language processing will help achieve a payback on EHRs

Information Management Resources

With almost all healthcare organizations now using electronic records, computer algorithms will increasingly mine unstructured data to help improve care. Machine learning Healthcare analytics EHR analysis EHR documentation

How Did We Get Here? Five Technologies that led to electronic records

Positively RIM

The RIM world still wrestles with the progression of paper records into electronic records, as well as the integration of the two. Computer power. The bits of information that a scanner produces need control and direction, meaning they had to pass through a computer. In the mid-80s, personal computers had limited processing power, and mainframe processing was expensive. Before the mid-80s, computer monitors generally showed only plain, alphanumeric characters.

University of Florida Brings eDiscovery Teachings to a Chinese University: eDiscovery Best Practices

eDiscovery Daily

Computer” and “Nanjing Electric.”. “I Computer to be incorporated into a product that was then sold to consumers. computer sued Nanjing Electric for breach of contract.”. Electronic Discovery International eDiscovery

Even with Bad Communication and Unfulfilled Discovery Obligations, Sanctions Still Not Granted: eDiscovery Case Law

eDiscovery Daily

It was also charged that the relators intentionally deleted computer files concerning these conversations and threw away the computer on which the files were stored, thereby precluding examination of the relevant metadata. Case Law Electronic Discovery Production Sanctions

Relativity Fest is Here! And So Are We!: eDiscovery Trends

eDiscovery Daily

Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

“Master” Your Knowledge of eDiscovery With This Conference in Washington DC Again This Year: eDiscovery Trends

eDiscovery Daily

This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data. It’s October!

Whee! What a Great Event at the Second Annual WiE Legal Technology Showcase and Conference: eDiscovery Trends

eDiscovery Daily

The keynote address ( The Future Practice of Law: AI, Blockchain and Quantum Computing ) was presented by Shawnna Hoffman, Global Co-Leader of the IBM Cognitive Legal Practice, IBM from 10:00am-11:00am. Electronic Discovery Industry Trends

And the survey said. Make your voice heard on the future of Information Management


Do New Hires Think Your Organization Resembles a Computer Museum? information governance electronic records management content mangement IIM intelligent information managementThere’s a lot going on in the content management space right now. The "scale" of information challenges is getting bigger by the day -- bigger files, more of them, in wildly varying formats and in demand across more and more applications and processes.

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Two

eDiscovery Daily

Throughout the case, the plaintiff claimed that the evidence needed to prove the case existed in emails stored on UBS’ own computer systems. The problems faced by these new rules was the multiplicity of data in electronic formats. Electronic Discovery Outsourcing Pricing

Standardizing the Non-Standard Digital Forensics Protocol, Sort Of: eDiscovery Best Practices

eDiscovery Daily

Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Court Denies Request for Production of Forensic Image: eDiscovery Case Law

eDiscovery Daily

An item in dispute was a computer used by an employee when he was working for Finos, which was in the possession of those partners at the time of the dissolution and became their property. During discovery, the plaintiff learned that the Finos computer was in the possession of those partners, who were not parties to this litigation. Apex was not given a full forensic image of the Finos computer hard drive. Case Law Electronic Discovery ProductionIn Apex Colors, Inc.

Court Rules Non-Party Subpoenaed ESI Not Subject to 100-Mile Boundary: eDiscovery Case Week

eDiscovery Daily

The plaintiff requested documents from Mitchell pertaining to “the correspondence, purchase, and analysis of the [computer valuation system]” Mitchell utilized to create valuations of total loss vehicles for the defendant and served Mitchell through its Oklahoma registered agent.

Off the Record: Ransomware Threats and RM Modernization, Apple Promotes Access and Washington Denies Access

The Texas Record

The city of Atlanta was recently hit with a hacking attack that took control of much of the city’s computer network and this type of event is not a one off. Links Access Cartoon electronic records ERMS Health Information Humor Off the Record Open Records Public Records RIM Month

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

Krebs on Security

The email allowed the intruders to install malware on the victim’s PC and to compromise a second computer at the bank that had access to the STAR Network , a system run by financial industry giant First Data that the bank uses to handle debit card transactions for customers.

U.S. Supreme Court to Weigh in on Extraterritorial Search Warrant Dispute

Data Matters

The decision now under review held that electronic communications that are stored exclusively on foreign servers cannot be reached by U.S. officials, by using computers and personnel based in the United States. Cloud Computing European Union International Litigation Online PrivacyOn October 16, 2017, the U.S. Supreme Court granted the U.S.

Court Puts an End to an Inquiry to “Rival the Punic Wars”: eDiscovery Case Law

eDiscovery Daily

In March 2018, the plaintiff then requested forensic investigation of former employees’ (now working for the defendant) computers, which were located in China, based on two emails that appeared to hint at the concealment of stolen IP. Case Law Electronic Discovery Proportionality

Potential Congressional Action on Cross Border Data? A Primer on the CLOUD Act

Data Matters

In recent years, the rise of cloud computing has led to more and more data being stored somewhere other than the jurisdiction in which it was created. Cloud Computing International Legislation PolicyThis trend increasingly has led U.S. law enforcement officials to demand access to information held abroad, just as foreign officials increasingly want access to data held inside the United States. But satisfying these growing desires for cross-border access has proven complicated.

e-Records 2017: “Teacher Retirement System of Texas: The Information Governance Journey”

The Texas Record

TSLAC Wants Your Electronic Records. These results were used to develop a big bucket retention schedule and create standard repositories for electronic records. Training Conferences electronic records Email eRecords eRecords 2017 Information Governance Retention

Cyber Blackmail: More Than Just Ransomware

The Texas Record

Ransomware Hits CDOT Computers. News Cyber Security electronic records Information Governance Local Governments ransomware security State Agencies

Public or Private Isn’t the Only Question You Should be Asking about Cloud Solutions: eDiscovery Best Practices

eDiscovery Daily

Platform as a service (PaaS) is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage web applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.

Law Firm Partner Says Hourly Billing Model “Makes No Sense” with AI: eDiscovery Trends

eDiscovery Daily

Davis showed the audience a slide quoting Andrew Ng, a computer scientist and professor at Stanford University: “If a typical person can do a mental task with less than one second of thought, we can probably automate it using AI either now or in the near future.”

The author of the LuminosityLink RAT sentenced to 30 Months in Prison

Security Affairs

to more than 6,000 customers, he also helped them to hack computers worldwide. LuminosityLink, that Grubbs knew would be used by some customers to remotely access and control their victims’ computers without the victims’ knowledge or consent.

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

Mary is the author of A Process of Illumination: The Practical Guide to Electronic Discovery , considered by many to be the first popular book on e-discovery. Brett is Principal of Burney Consultants LLC , and focuses the bulk of his time on bridging the chasm between the legal and technology frontiers of electronic discovery. Cheriton School of Computer Science at the University of Waterloo and principal of Maura Grossman Law. Electronic Discovery Industry Trends

Naming & Shaming Web Polluters: Xiongmai

Krebs on Security

If ever there were a technology giant that deserved to be named and shamed for polluting the Web, it is Xiongmai — a Chinese maker of electronic parts that power a huge percentage of cheap digital video recorders (DVRs) and Internet-connected security cameras.

eDiscovery Expert Brett Burney Reviews CloudNine Platform

eDiscovery Daily

Backed by a strong history of litigation services, the CloudNine platform is an easy-to-use choice for processing, reviewing, and producing the electronic data you collect from your client or an opposing party. News eDiscovery Electronic Discovery

Former Football Players Sanctioned for Failure to Produce: eDiscovery Case Law

eDiscovery Daily

Electronic Arts, Inc., Three former NFL players claimed that Electronic Arts (EA) used their likenesses in the Madden NFL videogame series without authorization. The plaintiffs also said the requested privilege log was rendered unusable due to a computer error even though both the plaintiffs and the plaintiffs’ attorney had stated in an earlier hearing that they had regular communications via email regarding the case. In Michael E. Davis, et al. 10-cv-03328-RS, (N.D.

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Six

eDiscovery Daily

To sum up, Ralph sees three big advances in the field of search analytics that are dictating the new alternatives to IG: Big Data, cheap parallel computing and better algorithms. Electronic Discovery Information Governance

Plaintiff is Able to Get Some Subpoenas for Personal Data Quashed, But Not All: eDiscovery Case Law

eDiscovery Daily

After the plaintiff left the vessel, defendants located a computer file supposedly created by the plaintiff, containing text messages, emails, and photographs dated October 2013 to July 2014 that seemed to reflect drug transactions and a volatile relationship, but the plaintiff (in his deposition) denied fighting with his girlfriend and denied punching through the wheelhouse window. Case Law Electronic Discovery Mobile Devices ProportionalityIn Delgado v. Tarabochia, et al.,

eDiscovery Expert Tom O’Connor Reviews CloudNine Platform

eDiscovery Daily

Platform Description: CloudNine is an integrated, automated proprietary software offering which allows users to immediately upload, review, and produce electronic documents. Electronic Discovery. News eDiscovery Electronic DiscoveryWhat I Like About CloudNine.