New Rules Announced for Border Inspection of Electronic Devices

Threatpost

Cloud Security Cryptography Government Mobile Security Privacy ACLU cameras computers digital privacy digital search Electronic Frontier Foundation Encryption passcodes phones reasonable suspicion tablets U.S. The U.S. Customs and Border Patrol announced new restrictions on when agents can copy data from digital devices at border crossing points.

GDPR and The Data Governance Imperative

AIIM

GDPR and the Data Governance Imperative. The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

Thales eSecurity

Preparing for Data Security in the Quantum Computing Era. Each passing day brings the world closer to the exciting reality of powerful quantum computing. Weather prediction, air traffic control, urban planning, defense strategies, medical research and so much more will be affected by the new era of computing power in ways we can’t even yet predict. Quantum computing is a threat to public key infrastructure and security systems that rely on it.

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment: eDiscovery Case Law

eDiscovery Daily

At Appellant’s apartment, after the agents discovered a single computer, an HP Envy 700 desktop, which was encrypted with TrueCrypt, Appellant informed the agents that he lived alone, that he was the sole user of the computer, and that only he knew the password to his computer.

Croatia government agencies targeted with news SilentTrinity malware

Security Affairs

Croatia government agencies have been targeted by unknown hackers with a new piece of malware tracked as SilentTrinity. The SilentTrinity malware can take control over an infected computer, it allows attackers to execute arbitrary commands.

Privacy and Innovation Combined in Information Governance

Everteam

The late 20 th century technological revolution in the US gave birth to the internet and personal computer, paving a path for 21 st century innovation in personal devices, apps, and social media – with Silicon Valley giants leading the way towards a more connected future.

e-Records 2017: “Teacher Retirement System of Texas: The Information Governance Journey”

The Texas Record

Information Governance: Take Control and Succeed. TSLAC Wants Your Electronic Records. Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365. Data Protection and Information Governance across Data Silos.

Tending Your Garden: Why Information Governance Should be an Ongoing Process in Your Organization: eDiscovery Best Practices

eDiscovery Daily

Jim’s post below highlights the importance of a strong information governance program and how creation of a data map can be a key component to that IG program. Complying with the management requirements of personal data in Europe’s impending General Data Protection Regulation (GDPR) will make information governance even more of a priority than ever as Tom O’Connor and I discussed in last week’s webcast. Electronic Discovery Information Governance Privacy

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

Let’s look at the series, both on the Local Government and State Agency Schedule. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

Andrew’s Favorite Retention Series: Software Programs

The Texas Record

Let’s look at the series, both on the Local Government and State Agency Schedule. Retention Note: If the retention period of electronic records is extended to meet requirements of an audit, litigation, Public Information Act request, etc.

Strategies to Protect your Records from Ransomware

The Texas Record

As information technology continues to advance, it is vital that all local government offices and state agencies understand how to mitigate the risks of an attack on your records management system. The security of electronic records is a joint responsibility of RM and IT.

Microsoft Calls for Legislative Action to Set Rules for Cloud Computing

Hunton Privacy

Microsoft is urging Congress and the information technology industry to act now to ensure that cloud computing is guided by an international commitment to privacy, security and transparency for consumers, businesses and government. Microsoft also has called for an international dialogue on data sovereignty to address users’ desire that rules and regulations governing their data remain uniform regardless of the physical location of the information.

Why Are Businesses Opting for Edge, AI, and IoT – and Are They Wise to Do So?

ARMA International

Edge computing is increasingly associated with at least two “trending” terms in the IT and information arenas: Internet of Things (IoT) and artificial intelligence (AI). Broadly speaking, the term refers to computing that’s done at or near the source of the data.

Midterm Election Security: Why Patching Is a Critical Issue

Data Breach Today

Many of the computer devices to be used for electronic voting in November's midterm elections have unpatched older operating systems that make them vulnerable, says Darien Kindlund, a data scientist at the cybersecurity firm Insight Engines, which advises governments and others

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

On May 15, 2017, the US Government Accountability Office (GAO) released a new report entitled “ Internet of Things: Status and implications of an increasingly connected world.” The GAO also convened a number of expert meetings during the drafting process, bringing together experts from various disciplines, including computer science, security, privacy, law, economics, physics, and product development. Cloud computing.

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. Ransomware Hits CDOT Computers.

NIST Issues Guidelines on Security and Privacy in Public Cloud Computing

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) has issued draft Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144) (the “Guidelines”) for public comment. The Guidelines provide an overview of the security and privacy challenges pertinent to public cloud computing, and identify considerations for organizations outsourcing data, applications and infrastructure to a public cloud environment. Governance.

This is the old ChiefTech blog.: The Circle of Computing Life

ChiefTech

Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. Its a particularly unusual story, because the idea for the computer in question emerged in the first half of the last century on the back of early management thinking (particularly scientific management) and the needs of Joseph Lyons and Co. This is the old ChiefTech blog.

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

eDiscovery Daily

During the period at issue in this case, the warning banner advised (among other things) that at any time, the US Government may inspect and seize data stored on the information system. Case Law Electronic Discovery Email PrivacyIn United States v. Caputo, No. 3:18-cr-00428-IM (D.

To get the most from blockchain in government, a sharing mindset is needed

CGI

To get the most from blockchain in government, a sharing mindset is needed. When I was at university earning my Masters in Computer Science, I devoted a lot of my coursework to distributed computing. federal government. Released in April, the playbook helps government organizations envision how blockchain technology can solve a myriad of government challenges. Importance of governance.

And the survey said. Make your voice heard on the future of Information Management

AIIM

Do New Hires Think Your Organization Resembles a Computer Museum? information governance electronic records management content mangement IIM intelligent information managementThere’s a lot going on in the content management space right now. The "scale" of information challenges is getting bigger by the day -- bigger files, more of them, in wildly varying formats and in demand across more and more applications and processes.

FAQ Redux: Can a state agency destroy a paper original after scanning?

The Texas Record

While there is not an explicit paragraph in the rules stating that any record can be store electronically, in Section 6.92(4), And what are the requirements for keeping a record electronically now? FAQ Digitization electronic records eRecords scanning State Agencies

Canada Uses Civil Anti-Spam Law in Bid to Fine Malware Purveyors

Krebs on Security

Canadian government regulators are using the country’s powerful new anti-spam law to pursue hefty fines of up to a million dollars against Canadian citizens suspected of helping to spread malicious software.

Friday the 13th is Unlucky for the City of New Orleans. Almost. Maybe.: Cybersecurity Trends

eDiscovery Daily

” As a precautionary measure, the NOLA tweet confirmed, the city’s IT department gave the order for all employees to power down computers and disconnect from Wi-Fi. However, in August, 23 government agencies were taken offline by a cyber-attack on the State of Texas.

Today is the Day to “Master” Your Knowledge of eDiscovery in Washington DC for 2018: eDiscovery Trends

eDiscovery Daily

This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. I will be moderating a panel of eDiscovery experts that includes Mike Quartararo , Founder and Managing director of eDPM Advisory Services and author of the 2016 book Project Management in Electronic Discovery; Robert D. Electronic Discovery Industry Trends Information GovernanceIt’s here!

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems. Government.

IT 285

Leaked Memo Warns of Poor Cybersecurity in White House

Adam Levin

Acquired and published online by Axios, the memo was included in a resignation letter from Branch Chief of White House Computer Network Defense Dimitrios Vastakis. Data Security Government featured White House Trump giuliani OCISO

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! Electronic Discovery Security

“Master” Your Knowledge of eDiscovery With This Conference in Washington DC Again This Year: eDiscovery Trends

eDiscovery Daily

This year’s Washington DC event includes nearly two days of educational sessions covers topics ranging from privacy to cybersecurity to social media to cloud computing. I will be moderating a panel of eDiscovery experts to discuss the challenges that big data place on information governance and legal discovery professionals and potential approaches for addressing those challenges. Electronic Discovery Industry Trends Information GovernanceIt’s October!

De-Duplicating Software: An Introduction

The Texas Record

One of the most useful tools in managing electronic records is de-duplication software. Is it right for your government? In short, de-duplication software can be used to analyze electronic records to determine if there are duplicates in a drive or folder.

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Six

eDiscovery Daily

Ralph Losey made the point best when he observed that “ AI-Enhanced Big Data Search Will Greatly Simplify Information Governance” (in this blog post here ). Much of Information Governance is devoted to trying to determine what information is a valuable needle, and what is worthless chaff.

Ignoring Internet of Things Devices Could Be IdIoTic: eDiscovery Trends

eDiscovery Daily

However, Walton suggested lawyers should always evaluate if their client’s legal matter warrants obtaining information from an IoT device and make proportional requests for the data, an approach that also governs other types of discoverable content. Electronic Discovery Industry Trends

IoT 58

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

US forecloses the government’s ability to obtain this type of data without a warrant. Case Law Electronic DiscoveryAs we noted Tuesday and yesterday , eDiscovery Daily published 66 posts related to eDiscovery case decisions and activities over the past year, covering 56 unique cases !

Feds Charge Three in Mass Seizure of Attack-for-hire Services

Krebs on Security

” Another important distinction between this week’s coordinated action and past booter site takedowns was that the government actually tested each service it dismantled to validate claims about attack firepower and to learn more about how each service conducted assaults.

Potential Congressional Action on Cross Border Data? A Primer on the CLOUD Act

Data Matters

In recent years, the rise of cloud computing has led to more and more data being stored somewhere other than the jurisdiction in which it was created. Foreign Government Access to Data Held in the United States. law enforcement access to data held abroad, the CLOUD Act also addresses the converse issue in the debate about cross-border government access: foreign government access to information held in the United States.

2019 eDiscovery Case Law Year in Review, Part 4

eDiscovery Daily

Court Sanctions US Government for Spoliation in Copyright Infringement Case : In 4DD Holdings, LLC v. Case Law Electronic Discovery

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

Join us to hear examples of failures by a major medical center, a major financial institution, a large federal government agency, and a noted presidential advisor. From law firm, to corporation, to service provider, to government, and beyond. Electronic Discovery Industry Trends