article thumbnail

Do’s and Don’ts of Text Message Discovery

eDiscovery Daily

Corporate servers stored the data, regardless of how the email was sent or received (via mobile device or work computer). Lee: FFS, an insurance broker, requested the production of all written communication after the defendants violated their contract by sharing company information after termination. 4] Anthony J.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

Dun & Bradstreet said that so far this year it has received over 4,700 tips and leads where business identity theft or malfeasance are suspected. She shared with me a copy of the lease, which included a fraudulent ID and even a vehicle insurance card for a Land Cruiser we got rid of like 15 years ago. ” PHANTOM OFFICES.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! requires the attorney to act reasonably and promptly to stop the breach and mitigate the damage, using “all reasonable efforts” to restore computer operations to be able to continue client services.

article thumbnail

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

I got good grades in mathematics at school but it was an evening class in secondary school that I took in what was then called EDP (Electronic Data Processing) that got me started. We didn’t even have a computer at that school so the whole class was about things drawn on the blackboard. That’s a huge advantage.

MDM 49
article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities. The Computer-Aided Investigative Environment (CAINE) is an open-source Ubuntu- and Linux-based distribution created by Italian developers for digital forensic purposes.

article thumbnail

The Personnel File: Retention & Best Practices

The Texas Record

Additionally, if you are using a Human Resources Information System (HRIS) or other kind of Content Management System to maintain all these records electronically, all your records can be easily auto-classified into the correct series. State Records Retention Schedule.