New Rules Announced for Border Inspection of Electronic Devices

Threatpost

Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

Thales eSecurity

Preparing for Data Security in the Quantum Computing Era. Each passing day brings the world closer to the exciting reality of powerful quantum computing. Weather prediction, air traffic control, urban planning, defense strategies, medical research and so much more will be affected by the new era of computing power in ways we can’t even yet predict. Quantum computing is a threat to public key infrastructure and security systems that rely on it.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

GDPR and The Data Governance Imperative

AIIM

GDPR and the Data Governance Imperative. The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information. The Information Governance Imperative. So where do you begin your governance journey? A potentially useful governance framework is the IGRM reference model.

Don’t Lose Your Information in the “Junk Drawer”: Make Time for Information Governance in Healthcare

InfoGoTo

Whether this information consists of paper documents, electronic files, EMR data, or even legacy microfiche, are you fully aware of every single document or file in your organization and can you pinpoint anything you are looking for with ease? Don’t let information governance in healthcare take a back seat. ” “I know I saved that file to my computer drive but it’s not showing up in a search and I need it for my meeting in 30 minutes.”

Documenting the Premature Destruction of Local Government Records

The Texas Record

But what about local governments? Certain local government records management compliance rules were removed during the 86 th legislative session and among those was the requirement that local governments need to file paperwork with TSLAC in the case of premature destruction of records. So how can governments document premature destruction of records now? name of your local government, department, address, etc).

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

eDiscovery Daily

At Appellant’s apartment, after the agents discovered a single computer, an HP Envy 700 desktop, which was encrypted with TrueCrypt, Appellant informed the agents that he lived alone, that he was the sole user of the computer, and that only he knew the password to his computer. When the agent requested that Appellant provide him with the password to the computer, he responded: “It’s 64 characters and why would I give that to you? In Commonwealth v.

Croatia government agencies targeted with news SilentTrinity malware

Security Affairs

Croatia government agencies have been targeted by unknown hackers with a new piece of malware tracked as SilentTrinity. A mysterious group of hackers carried out a series of cyber attacks against Croatian government agencies, infecting employees with a new piece of malware tracked as SilentTrinity. The SilentTrinity malware can take control over an infected computer, it allows attackers to execute arbitrary commands.

Privacy and Innovation Combined in Information Governance

Everteam

The late 20 th century technological revolution in the US gave birth to the internet and personal computer, paving a path for 21 st century innovation in personal devices, apps, and social media – with Silicon Valley giants leading the way towards a more connected future. Europe has cultivated a culture that values privacy above all, with long-standing laws that dictate how private information can be gathered and used (including the Privacy and Electronic Communications Directive 2002).

Tools TSLAC Uses To Access and Make Available Older Formats

The Texas Record

If you’ve ever taken our Managing Electronic Records class or perused our electronic records webinars, you’re aware that a major responsibility for storing records electronically is providing continuous access to those records throughout their life cycle. The first section of the post will focus on electronic forms while the second second will focus on analog formats. Electronic Formats. Electronic records can come in many shapes and sizes.

FAQ: How does web archiving fit into records management?

The Texas Record

Records Management for Blogs, Texts, Social Media, Cloud Computing and more! FAQ Tips Blogs Electronic Record Access electronic records eRecords Facebook Local Government Local Governments Managing Electronic Records Maria Freed Social Media social media archiving social media capture Social Media Records social network State Agencies Text Messages Text Messaging Texting Tweets Twitter

Despite Estimate of 37 Years to Crack iPhone, Government Doesn’t Have to Return it – Yet: eDiscovery Case Law

eDiscovery Daily

Wolford denied the defendant’s Motion for Return of Property Under Federal Rule of Criminal Procedure 41(g), ruling that “[t]he government’s evidentiary interest in the [defendant’s] iPhone outweighs Defendant’s interest in its return, at least at this stage of the proceedings”. Instead, Defendant argues that his interest in his iPhone and the information contained therein exceeds the government’s interest in the device, and thus, the Court should order its return.”.

e-Records 2017: “Teacher Retirement System of Texas: The Information Governance Journey”

The Texas Record

Information Governance: Take Control and Succeed. TSLAC Wants Your Electronic Records. Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365. Data Protection and Information Governance across Data Silos. Teacher Retirement System of Texas: The Information Governance Journey. These results were used to develop a big bucket retention schedule and create standard repositories for electronic records.

Tending Your Garden: Why Information Governance Should be an Ongoing Process in Your Organization: eDiscovery Best Practices

eDiscovery Daily

Jim’s post below highlights the importance of a strong information governance program and how creation of a data map can be a key component to that IG program. Complying with the management requirements of personal data in Europe’s impending General Data Protection Regulation (GDPR) will make information governance even more of a priority than ever as Tom O’Connor and I discussed in last week’s webcast. Electronic Discovery Information Governance Privacy

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government. Microsoft also has called for an international dialogue on data sovereignty to address users’ desire that rules and regulations governing their data remain uniform regardless of the physical location of the information.

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

On May 15, 2017, the US Government Accountability Office (GAO) released a new report entitled “ Internet of Things: Status and implications of an increasingly connected world.” The GAO also convened a number of expert meetings during the drafting process, bringing together experts from various disciplines, including computer science, security, privacy, law, economics, physics, and product development. Cloud computing.

Strategies to Protect your Records from Ransomware

The Texas Record

As information technology continues to advance, it is vital that all local government offices and state agencies understand how to mitigate the risks of an attack on your records management system. Backup your information: Your data should be backed up in multiple locations, primarily in locations where it is not constantly connected to the computer or network. These viruses attack electronic records in various forms such as Word Document, email, Excel Spreadsheet, etc.

Midterm Election Security: Why Patching Is a Critical Issue

Data Breach Today

Many of the computer devices to be used for electronic voting in November's midterm elections have unpatched older operating systems that make them vulnerable, says Darien Kindlund, a data scientist at the cybersecurity firm Insight Engines, which advises governments and others

An Early Recap of Privacy in 2020: A US Perspective

Data Matters

Employers and governments have been required to consider privacy in adjusting workplace practices to account for who has a fever and other symptoms, who has traveled where, who has come into contact with whom, and what community members have tested positive or been exposed. As a result of all this need for tracking and tracing, governments and citizens alike have recognized the inevitable trade-offs between exclusive focus on privacy versus exclusive focus on public health and safety.

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

The Security Ledger

In this Spotlight Edition of The Security Ledger Podcast, sponsored by Trusted Computing Group (TCG), we’re joined by Intel Fellow Claire Vishik to talk about the evolving concept of online “trust.” You might not have heard of the Trusted Computing Group but you have definitely used technology it helped develop and deliver. But, if you haven’t noticed, computing environments are becoming more diverse and complex.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

Let’s look at the series, both on the Local Government and State Agency Schedule. Until electronic records are transferred to and made usable in a new software environment, or there are no electronic records being retained to meet an approved retention period that require the software to be retrieved and read. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

Let’s look at the series, both on the Local Government and State Agency Schedule. Until electronic records are transferred to and made usable in a new software environment, or there are no electronic records being retained to meet an approved retention period that require the software to be retrieved and read. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

Why Are Businesses Opting for Edge, AI, and IoT – and Are They Wise to Do So?

ARMA International

Edge computing is increasingly associated with at least two “trending” terms in the IT and information arenas: Internet of Things (IoT) and artificial intelligence (AI). Broadly speaking, the term refers to computing that’s done at or near the source of the data. These great distances can result in delays in computing, which can impact an organization’s capacity to optimally analyze and leverage its data.

NIST Issues Guidelines on Security and Privacy in Public Cloud Computing

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) has issued draft Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144) (the “Guidelines”) for public comment. The Guidelines provide an overview of the security and privacy challenges pertinent to public cloud computing, and identify considerations for organizations outsourcing data, applications and infrastructure to a public cloud environment. Governance.

This is the old ChiefTech blog.: The Circle of Computing Life

ChiefTech

Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. Its a particularly unusual story, because the idea for the computer in question emerged in the first half of the last century on the back of early management thinking (particularly scientific management) and the needs of Joseph Lyons and Co. This is the old ChiefTech blog.

And the survey said. Make your voice heard on the future of Information Management

AIIM

Do New Hires Think Your Organization Resembles a Computer Museum? information governance electronic records management content mangement IIM intelligent information managementThere’s a lot going on in the content management space right now. The "scale" of information challenges is getting bigger by the day -- bigger files, more of them, in wildly varying formats and in demand across more and more applications and processes.

To get the most from blockchain in government, a sharing mindset is needed

CGI

To get the most from blockchain in government, a sharing mindset is needed. When I was at university earning my Masters in Computer Science, I devoted a lot of my coursework to distributed computing. federal government. Released in April, the playbook helps government organizations envision how blockchain technology can solve a myriad of government challenges. Importance of governance.

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. The city of Atlanta’s operations were virtually dragged to a halt after an unmet demand for roughly $50,000 in ransom ended up essentially crippling the city’s government and has already cost at least $2.7 Ransomware Hits CDOT Computers.

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. I will be moderating a panel of eDiscovery experts that includes Mike Quartararo , Founder and Managing director of eDPM Advisory Services and author of the 2016 book Project Management in Electronic Discovery; Robert D. Electronic Discovery Industry Trends Information GovernanceIt’s here!

FAQ Redux: Can a state agency destroy a paper original after scanning?

The Texas Record

While there is not an explicit paragraph in the rules stating that any record can be store electronically, in Section 6.92(4), 4), the definition of an electronic state record references Government Code, Section 441.189(a), which states: Any state record may be created or stored electronically in accordance with standards and procedures adopted as administrative rules of the commission. And what are the requirements for keeping a record electronically now?

“Master” Your Knowledge of eDiscovery With This Conference in Washington DC Again This Year: eDiscovery Trends

eDiscovery Daily

This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. I will be moderating a panel of eDiscovery experts to discuss the challenges that big data place on information governance and legal discovery professionals and potential approaches for addressing those challenges. Electronic Discovery Industry Trends Information GovernanceIt’s October!

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

eDiscovery Daily

Immergut denied the defendant’s motion to suppress emails and evidence derived from a warrantless search of Defendant’s workplace email account, finding “any expectation of privacy in Defendant’s work email was objectively unreasonable under the military’s computer-use policies in effect at his workplace.”. Case Law Electronic Discovery Email PrivacyIn United States v. Caputo, No. 3:18-cr-00428-IM (D. Or Nov. 6, 2019) , Oregon District Judge Karin J.

Friday the 13th is Unlucky for the City of New Orleans. Almost. Maybe.: Cybersecurity Trends

eDiscovery Daily

” As a precautionary measure, the NOLA tweet confirmed, the city’s IT department gave the order for all employees to power down computers and disconnect from Wi-Fi. Louisiana school district computers were also taken offline, and a state of emergency declared, in response to a ransomware attack in July. However, in August, 23 government agencies were taken offline by a cyber-attack on the State of Texas. Electronic Discovery Security

U.S. Supreme Court to Weigh in on Extraterritorial Search Warrant Dispute

Data Matters

government’s request for review of a lower court decision that rejected the government’s construction of the Stored Communications Act (SCA) and embraced a more restrictive view that Microsoft had advanced, backed by much of the tech industry and many privacy groups. The decision now under review held that electronic communications that are stored exclusively on foreign servers cannot be reached by U.S. Cloud Computing European Union International Litigation Online Privacy

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! Finding this odd, you turn to your firm receptionist who tells you that the firm was hit with a ransomware attack overnight, and that if you turn on your computer all of your files will be immediately encrypted, subject to a bitcoin ransom.”. Electronic Discovery Security

De-Duplicating Software: An Introduction

The Texas Record

One of the most useful tools in managing electronic records is de-duplication software. Is it right for your government? In short, de-duplication software can be used to analyze electronic records to determine if there are duplicates in a drive or folder. Say you’ve got a file structure that beautifully outlines where your government’s Health and Wellness Committee records are stored. Some types I experimented with – on my home computer – were bloatware or malware.

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Six

eDiscovery Daily

Ralph Losey made the point best when he observed that “ AI-Enhanced Big Data Search Will Greatly Simplify Information Governance” (in this blog post here ). Because as he put it, In order to meet the basic goal of finding information, Information Governance focuses its efforts on the proper classification of information. Much of Information Governance is devoted to trying to determine what information is a valuable needle, and what is worthless chaff.

Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Krebs on Security

Canadian government regulators are using the country’s powerful new anti-spam law to pursue hefty fines of up to a million dollars against Canadian citizens suspected of helping to spread malicious software. Section 8 involves the surreptitious installation of computer programs on computers or networks including malware and spyware.

Ignoring Internet of Things Devices Could Be IdIoTic: eDiscovery Trends

eDiscovery Daily

However, Walton suggested lawyers should always evaluate if their client’s legal matter warrants obtaining information from an IoT device and make proportional requests for the data, an approach that also governs other types of discoverable content. Further, it addresses topics including data privacy, fog computing, smart cities and more. Electronic Discovery Industry Trends

IoT 44

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums.

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

Mary is the author of A Process of Illumination: The Practical Guide to Electronic Discovery , considered by many to be the first popular book on e-discovery. Brett is Principal of Burney Consultants LLC , and focuses the bulk of his time on bridging the chasm between the legal and technology frontiers of electronic discovery. Jason is a member of Drinker Biddle & Reath LLP ’s Information Governance and eDiscovery practice and co-chair of the Information Governance Initiative.