Remove Computer and Electronics Remove Government Remove Survey Remove Webinar
article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number). It remains unclear how the data breach occurred, but the attackers apparently suggested it was the result of “exploiting vulnerabilities within government databases of telecommunication systems”.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Two: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. If you missed it, you can check out the replay here. In Riley v. California , 134 S.Ct.