article thumbnail

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

eDiscovery Daily

At Appellant’s apartment, after the agents discovered a single computer, an HP Envy 700 desktop, which was encrypted with TrueCrypt, Appellant informed the agents that he lived alone, that he was the sole user of the computer, and that only he knew the password to his computer.

article thumbnail

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

.” “Mitsubishi Electric, a major general electronics maker , has been hit by a large-scale cyber attack , and it has been found that information about public and private business partners such as highly confidential defense-related and important social infrastructure such as electric power and railroad may leak out.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Judge Recommends Sanctions for Defendant Under FRCP 37(e)(1): eDiscovery Case Law

eDiscovery Daily

In this case for workplace harassment and discrimination, this particular dispute began with the plaintiff’s document request, which required the defendant to produce emails and text messages exchanged between certain key parties involving the plaintiff. Case Background. Judge’s Ruling. Judge’s Ruling. So, what do you think?

article thumbnail

GDPR and The Data Governance Imperative

AIIM

The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information. The Changing Nature of Personally Identifiable Information. The Information Governance Imperative.

GDPR 91
article thumbnail

Craig Ball’s Wayback Machine and Look at the Mueller Report: eDiscovery Best Practices

eDiscovery Daily

Like me, several of you are fans of Rob Robinson’s quarterly eDiscovery Business Confidence Survey on his Complex Discovery blog and he has just published the results of his Spring 2019 Survey , which are very interesting and I will (hopefully) post my normal analysis on that tomorrow. Have you ever redacted documents natively?

article thumbnail

Free Ransomware Decryption Site Celebrates Milestone as New Threats Emerge

eSecurity Planet

The project now boasts 16 associate partners, including Emsisoft, Trend Micro, Bitdefender, Avast, Bleeping Computer, Cisco, Check Point, Tesorion, McAfee, ESET, CERT_PL, Eleven Paths, KISA, the French Police, and F-Secure. A recent Keeper Security survey of 2,000 U.S.

article thumbnail

AI, Records, and Accountability

ARMA International

An AI record is by definition a record of an AI “act” sufficient to document the act and make it intelligible. AI refers to computer systems that are able to perform tasks that are considered to require human intelligence – that is, cognitive tasks. Definitions of AI. A central ethical issue for AI is bias in ML algorithms.