article thumbnail

The Burden of Privacy In Discovery

Data Matters

Courts have frequently emphasized privacy concerns in these cases, where a party sought direct access to an opposing party’s computer systems under Rule 34(a)(1), which allows parties “to inspect, copy, test or sample. 55 As the court reminded the parties, “under the revised discovery rules, not all relevant information must be discovered.”56.

Privacy 97
article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. Ransomware Hits CDOT Computers. million dollars in recovery efforts to date. [1] Retrieved from WSBTV: [link]. [2]