article thumbnail

How to Maintain eDiscovery Data Integrity

eDiscovery Daily

As a vital part of the Electronic Discovery Reference Model (EDRM) , any data collected is done so with the intent to capture it exactly as intended or as it was actively being used. The variety, velocity, and complexity of electronic evidence multiply with each new generation and innovation of data technology.

article thumbnail

Generate More Revenue For Your Law Firm with Modern eDiscovery

eDiscovery Daily

By expanding your firm’s ability effectively and accurately collect and analyze emerging data types, you create new opportunities to meet the changing needs of your clients. Electronically stored information (ESI) evolves every time new software is created. Computer activity including the movement and alteration of files.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four Times Self-Collection Went Wrong

eDiscovery Daily

Judge Matthewman granted the defendants a second chance but required both parties to collaborate in a robust meet and confer. Only one employee oversaw the collection process, and he described himself in court as “computer illiterate.” To learn more information or request a demo, visit: [link]. [1] 1] Gretchen E.

article thumbnail

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. ” How did the first meeting go (were there snacks or tacos?), what was discussed?

IT 60
article thumbnail

Highlights from DefCon 2018

Thales Cloud Protection & Licensing

We attended the show with our colleague Paul Cleary and sat in on many talks (and demos) ranging from attacking IoT devices over insecure Bluetooth connections, to exploiting publically available expired certificates. Our favorite presentation was a talk called “Reaping and Breaking Keys at Scale: When Crypto Meets Big Data.”

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

Blog post with links: [link] [Live Demo] Ridiculously Easy Security Awareness Training and Phishing Old-school awareness training does not hack it anymore. You responded to my email in less than 3 mins and made time for a meeting the same day to show me how to get what we needed and to best use the tool. OK, but.why?:

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals. CBS: A computer security researcher was kept off a plane for suggesting on social media that he could hack into the planes control system.