article thumbnail

Choose the right SAQ to demonstrate PCI DSS compliance

IT Governance

As we recently discussed , any organisation that plans to demonstrate compliance with the Payment Card Industry Data Security Standard (PCI DSS) by completing a self-assessment questionnaire (SAQ) needs to make sure they have selected the right form. For merchants that outsource their entire card data processing to validated third parties.

article thumbnail

Simon Says – Once, Twice, Three Times a Spoliator: eDiscovery Case Law

eDiscovery Daily

To use definitions from my recent document subpoena, I have no ‘CLIENT DATA,’ ‘DELIVERABLES,’ ‘SOFTWARE,’ or ‘WORK PRODUCT.’”. He also saved a copy of his ScholarChip email account on his personal computer. The Private Client List, the ScholarChip emails, and the webinar recordings all appear to be relevant to the several lawsuits.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Will Lawyers Ever Embrace Technology?: eDiscovery Best Practices, Part Four

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Do they go to a community night course on computers? Electronic Discovery and Evidence , Fourth Edition, Michael Arkfeld (available for purchase at Law Partner Publishing/LexisNexis here ). Pursue online education?

article thumbnail

3 Ways to Protect Smart Devices from Criminal Exploits

Thales Cloud Protection & Licensing

3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 - 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a burglar stealing valuables such as jewelry, cash, electronics, and equipment.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Four: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. If you missed it, you can check out the replay here. Recent decisions, including Sublet v.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Two: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. We’ll publish Part 3 – Issues Managing ESI Data in Criminal Cases – on Friday.

article thumbnail

Understanding Blockchain and its Impact on Legal Technology, Part Two

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. Much speculation centered around the name being based on a setting in the 1996 movie Rising Sun; however, it was believed the true authors were several cryptography and computer science experts of non-Japanese descent.