Remove Computer and Electronics Remove Document Remove Education Remove Events
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. It’s a surreal experience, paging through hundreds of top-secret NSA documents. So would the FBI breaking into my home and seizing my personal electronics. And then I flew to Brazil.

article thumbnail

Whee! What a Great Event at the Second Annual WiE Legal Technology Showcase and Conference: eDiscovery Trends

eDiscovery Daily

Both events were at South Texas College of Law in downtown Houston. The event was a huge success, with a reported total of 239 attendees (considerably more than last year’s inaugural event). The event was a huge success, with a reported total of 239 attendees (considerably more than last year’s inaugural event).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

To prove ownership over the hijacked firms, they hire low-wage image editors online to help fabricate and/or modify a number of official documents tied to the business — including tax records and utility bills. Another team member works on revising the business documents and registering them on various sites.

article thumbnail

Twenty-One Points, Less Than 350 Words: eDiscovery Best Practices

eDiscovery Daily

As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). Do you feel you have an adequate understanding of technical concepts like electronic storage?

article thumbnail

How should you investigate a data breach?

IT Governance

This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. The scene of the incident will generally provide you with the clues you need to work out – or at least make an educated guess regarding – who was responsible for the breach and how it occurred. The crime scene.

article thumbnail

Regulation of AI-Based Applications: The Inevitable New Frontier

AIIM

No doubt, applications of AI may address some of the most vexing social challenges such as health, the environment, economic empowerment, education, and infrastructure. The economic benefits and utility of AI technologies are clear and compelling. Some argue that its provisions infringe on the First Amendment.

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

On July 3, 2018, plaintiff tendered a document request for, among other things, “surveillance footage, recordings or other video…that refer or relate to any events alleged in Plaintiff’s Complaint.” The plaintiff subsequently filed the suit in July 2017. Judge’s Ruling.