Remove Computer and Electronics Remove Insurance Remove Tips Remove Training
article thumbnail

Do’s and Don’ts of Text Message Discovery

eDiscovery Daily

Corporate servers stored the data, regardless of how the email was sent or received (via mobile device or work computer). Lee: FFS, an insurance broker, requested the production of all written communication after the defendants violated their contract by sharing company information after termination. 4] Anthony J.

article thumbnail

What’s a Lawyer’s Duty When a Data Breach Occurs within the Law Firm: Cybersecurity Best Practices

eDiscovery Daily

Right inside the door, you see a handwritten notice on a big whiteboard which says: All network services are down, DO NOT turn on your computers! requires the attorney to act reasonably and promptly to stop the breach and mitigate the damage, using “all reasonable efforts” to restore computer operations to be able to continue client services.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities. The Computer-Aided Investigative Environment (CAINE) is an open-source Ubuntu- and Linux-based distribution created by Italian developers for digital forensic purposes.

article thumbnail

The Personnel File: Retention & Best Practices

The Texas Record

We create and use personnel records to hire, re-hire, train, evaluate, compensate, address grievances, and provide verifications for all employees. Often maintained in individual files for each employee, the personnel file is added to regularly throughout its active life, and it may often be consulted during its long inactive life.