article thumbnail

Tools TSLAC Uses To Access and Make Available Older Formats

The Texas Record

If you’ve ever taken our Managing Electronic Records class or perused our electronic records webinars, you’re aware that a major responsibility for storing records electronically is providing continuous access to those records throughout their life cycle. Electronic Formats.

article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. FERC noted its support for an online reporting tool. electrical grids and power plants. 3) For “other suspicious activity associated with an ESP or associated EACMS, a monthly report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Archive-It Partner News, February 2019

Archive-It

Scoping your collections’ seeds just got faster and easier with this new tool. The Advanced Training webinar series returns on February 26 with Archive-It as a Reference Tool. The Advanced Training webinar series returns on February 26 with Archive-It as a Reference Tool. Advanced training. Community Calendar.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Two: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. So, TAR began as a process and in the early stage of the discussion, it was common to refer to various TAR tools under the heading “analytics” as illustrated by the graphic below from Relativity. Copyright © Relativity.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Three: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Thursday ( Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 ), which was great. The first is forensic images of computers and cell phones.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Four: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars. As Judge Peck noted on page 5 of the Hyles case mentioned above, “…the standard is not perfection, or using the “best” tool, but whether the search results are reasonable and proportional.”.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

There is also less hardware and compute power to work in your typical IoT device when compared to traditional devices, so embedding security becomes a matter of choice, rather than necessity. Think about IoT devices and the components within them, such as electronic control units (ECU) and the gateways that aggregate and transfer data.

IoT 78