Metadata Requirements for Permanent Electronic Records in the Cloud

National Archives Records Express

Metadata are records that need to be managed and retrievable These NARA Bulletins provide further records management guidance for agencies on the topic of metadata and cloud computing: NARA Bulletin 2015-04 : Metadata Guidance for the Transfer of Permanent Electronic Records. NARA Bulletin 2010-05 : Guidance on Managing Records in Cloud Computing Environments. General cloud cloud computing electronic records management metadata

Security Vulnerability in ESS ExpressVote Touchscreen Voting Computer

Schneier on Security

Of course the ESS ExpressVote voting computer will have lots of security vulnerabilities. It's a computer, and computers have lots of vulnerabilities. I am continuously amazed by how bad electronic voting machines are. Yes, they're computers.

New Rules Announced for Border Inspection of Electronic Devices

Threatpost

Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg.

Surging Samsung Electronics takes Intel's chipmaking crown

Information Management Resources

The firm has transformed itself from a maker of cheap televisions into a pervasive supplier of key components in smartphones and other modern computing devices and memory chips. Hardware and software Intel Samsung

Syrian Electronic Army Members Indicted for Conspiracy

Dark Reading

Two men have been charged for their involvement in a plot to commit computer hacking as members of the Syrian Electronic Army

48

Supreme Court of Pennsylvania Ruling on Common Law Duty to Protect Electronic Employee Data

Hunton Privacy

The case arose from a data breach in which criminals accessed UPMC’s computer systems and stole the personal and financial information of 62,000 current and former UPMC employees. The court held that: (1) an employer has a duty under Pennsylvania common law to use reasonable care to safeguard its employees’ sensitive personal information that it stores on Internet-accessible computer systems; and (2) Pennsylvania’s economic loss doctrine did not bar the plaintiffs’ negligence claim.

HHS Releases Guidance on HIPAA and Cloud Computing

Hunton Privacy

Earlier this month, the Department of Health and Human Services’ Office for Civil Rights issued guidance (the “Guidance”) for HIPAA-covered entities that use cloud computing services involving electronic protected health information (“ePHI”). Federal Law Business Associate Agreement Cloud Computing Department of Health and Human Services HIPAA Mobile Device Protected Health Information Security Rule Service Provider

Court Rules Fraud Involving a Computer Is Not ‘Computer Fraud’ under Crime Protection Policy

Hunton Privacy

18, 2016), that a crime protection insurance policy does not cover loss resulting from a fraudulent email directing funds to be sent electronically to the imposter’s bank account because the scheme did not constitute “computer fraud” under the policy. GAIC denied coverage, claiming that the loss did not directly result from the use of a computer nor did the use of a computer cause the transfer of the funds.

7 Best Practices for Data Destruction

InfoGoTo

Data destruction involves much more than hitting the “delete” key on a computer or moving data to a trash folder and emptying it. Doing either leaves an electronic trail that can still allow an unauthorized computer specialist to retrieve sensitive information.

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government. Information Security Online Privacy Cloud Computing Computer Fraud and Abuse Act Electronic Communications Privacy Act Microsoft

My Love for What I Do: eDiscovery Love Story

eDiscovery Daily

I once wrote an article about CAR systems back in the mid-80s – Computer Assisted (microfilm) Retrieval (good luck finding that article today) – and it seemed like the wave of the future back then. Electronic Discovery Industry TrendsIt’s Valentine’s Day!

Hard Drive Health: Top 10 Maintenance Tips

Record Nations

Computers are often one of a business’s most valuable tools and protecting their hard drives and the important information and software they store is crucial. Electronic Document Management

Tips 52

Podcast Episode 128: Do Security and Privacy have a Booth at CES?

The Security Ledger

In this episode of The Security Ledger podcast (#128): you're going to hear a lot from the annual Consumer Electronics Show (CES) out in Las Vegas this week, but are any of the new gadgets being released secure?

NIST Issues Guidelines on Security and Privacy in Public Cloud Computing

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) has issued draft Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144) (the “Guidelines”) for public comment. The Guidelines provide an overview of the security and privacy challenges pertinent to public cloud computing, and identify considerations for organizations outsourcing data, applications and infrastructure to a public cloud environment.

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

In assessing the plaintiff’s motion, Judge O’Hara noted that “the parties agreed the surveillance video is a form of electronically stored information (“ESI”) subject to the preservation requirements of Rule 37(e)”. Case Law Electronic Discovery Preservation SanctionsIn Stovall v.

This is the old ChiefTech blog.: The Circle of Computing Life

ChiefTech

Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. Its a particularly unusual story, because the idea for the computer in question emerged in the first half of the last century on the back of early management thinking (particularly scientific management) and the needs of Joseph Lyons and Co. This is the old ChiefTech blog.

Midterm Election Security: Why Patching Is a Critical Issue

Data Breach Today

Many of the computer devices to be used for electronic voting in November's midterm elections have unpatched older operating systems that make them vulnerable, says Darien Kindlund, a data scientist at the cybersecurity firm Insight Engines, which advises governments and others

Court Declines to Order Plaintiff to Produce Cell Phone in Employment Discrimination Case: eDiscovery Case Law

eDiscovery Daily

Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data. In Santana v.

FAQ Redux: Can a state agency destroy a paper original after scanning?

The Texas Record

While there is not an explicit paragraph in the rules stating that any record can be store electronically, in Section 6.92(4), And what are the requirements for keeping a record electronically now? FAQ Digitization electronic records eRecords scanning State Agencies

EU to force tech firms to hand over terror suspects' messages

The Guardian Data Protection

Under the plans, judges in one member state will be able to seize electronic evidence held on a service provider in another European country through a transnational European production order. European Union Digital media Europe UK security and counter-terrorism Counter-terrorism policy Social media Politics UK news Privacy Police Brexit Telecommunications industry Data and computer security Data protection

How Did We Get Here? Five Technologies that led to electronic records

Positively RIM

The RIM world still wrestles with the progression of paper records into electronic records, as well as the integration of the two. Computer power. The bits of information that a scanner produces need control and direction, meaning they had to pass through a computer. In the mid-80s, personal computers had limited processing power, and mainframe processing was expensive. Before the mid-80s, computer monitors generally showed only plain, alphanumeric characters.

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

Do they go to a community night course on computers? Beyond that, I’d also suggest the following books which are worth consulting as well: A Process of Illumination: The Practical Guide To Electronic Discovery , Mary Mack (available on Amazon here ).

How natural language processing will help achieve a payback on EHRs

Information Management Resources

With almost all healthcare organizations now using electronic records, computer algorithms will increasingly mine unstructured data to help improve care. Machine learning Healthcare analytics EHR analysis EHR documentation

GDPR and The Data Governance Imperative

AIIM

The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information.

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Three

eDiscovery Daily

Browning Marean and I spent years trying to begin a law school curriculum that included computer education with no success. Some commentators say this isn’t really necessary because the new generation is computer savvy. Electronic Discovery Ethics

Court Sanctions Defendants in Jimi Hendrix Copyright Infringement Case: eDiscovery Case Law

eDiscovery Daily

Myers (whose testimony the Court deemed credible and persuasive), found that each of the three computers he reviewed contained anti-forensic software (Advanced Mac Cleaner and CleanMyMac). Case Law Electronic Discovery Mobile Devices Preservation SanctionsIn Experience Hendrix, L.L.C.

First Ever Multi-State Data Breach Lawsuit Targets Healthcare Provider: Cybersecurity Trends

eDiscovery Daily

Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

Judge Recommends Sanctions for Defendant Under FRCP 37(e)(1): eDiscovery Case Law

eDiscovery Daily

One of the plaintiff’s alleged harassers left the company a mere two days after that, but his computer was wiped within 7 days of his last day at work. Noting that the “failure to preserve electronic evidence is covered by Fed.R.Civ.P. In Franklin v. Howard Brown Health Ctr.,

Court Denies Defendant’s Request for Protective Order Against Producing Metadata for Medical Records: eDiscovery Case Law

eDiscovery Daily

The plaintiff argued that given the materiality of the fact as to when plaintiff developed bed sores, he was entitled to the audit trail and metadata that would presumably show when plaintiff’s electronic medical record was altered and by whom. Case Law Electronic Discovery Production

Strategies to Protect your Records from Ransomware

The Texas Record

Backup your information: Your data should be backed up in multiple locations, primarily in locations where it is not constantly connected to the computer or network. These viruses attack electronic records in various forms such as Word Document, email, Excel Spreadsheet, etc.

Hewlett-Packard/Autonomy Deal Results in More Indictments: eDiscovery Trends

eDiscovery Daily

which was formed in the breakup of HP’s corporate computing divisions from its printer and PC business in 2015) praised the indictment. “HPE Electronic Discovery Ethics Industry Trends

Even with Bad Communication and Unfulfilled Discovery Obligations, Sanctions Still Not Granted: eDiscovery Case Law

eDiscovery Daily

It was also charged that the relators intentionally deleted computer files concerning these conversations and threw away the computer on which the files were stored, thereby precluding examination of the relevant metadata. Case Law Electronic Discovery Production Sanctions

And the survey said. Make your voice heard on the future of Information Management

AIIM

Do New Hires Think Your Organization Resembles a Computer Museum? information governance electronic records management content mangement IIM intelligent information managementThere’s a lot going on in the content management space right now. The "scale" of information challenges is getting bigger by the day -- bigger files, more of them, in wildly varying formats and in demand across more and more applications and processes.

250 Webstresser Users to Face Legal Action

Krebs on Security

In the United Kingdom, police have seized more than 60 personal electronic devices from a number of Webstresser users, and some 250 customers of the service will soon face legal action, Europol said in a statement released this week.

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems.

IT 212

University of Florida Brings eDiscovery Teachings to a Chinese University: eDiscovery Best Practices

eDiscovery Daily

Computer” and “Nanjing Electric.”. “I Computer to be incorporated into a product that was then sold to consumers. computer sued Nanjing Electric for breach of contract.”. Electronic Discovery International eDiscovery

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. I will be moderating a panel of eDiscovery experts that includes Mike Quartararo , Founder and Managing director of eDPM Advisory Services and author of the 2016 book Project Management in Electronic Discovery; Robert D. Electronic Discovery Industry Trends Information GovernanceIt’s here!

eDiscovery for the Rest of Us: eDiscovery Best Practices, Part Two

eDiscovery Daily

Throughout the case, the plaintiff claimed that the evidence needed to prove the case existed in emails stored on UBS’ own computer systems. The problems faced by these new rules was the multiplicity of data in electronic formats. Electronic Discovery Outsourcing Pricing

Mike Q Says the Weakest Link in TAR is Humans: eDiscovery Best Practices

eDiscovery Daily

Perhaps, when it comes down to it, the success of TAR being dependent on humans points us back to the long-used phrase regarding humans and computers: Garbage In, Garbage Out. Analysis Electronic Discovery Review Searching