Remove tag national-security
article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Two

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. A simple IG solution may include a Document Management System (DMS) product but the DMS itself is designed for the organization and search of only certain types of documents. Data access.

IT 31
article thumbnail

Security Affairs newsletter Round 266

Security Affairs

Every week the best security articles from Security Affairs free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived!

article thumbnail

Facebook Wants You to Send Them Your Naked Pictures to Prevent Revenge Porn. I’m Not Kidding: Data Privacy Trends

eDiscovery Daily

In the article Facebook: upload your nudes to stop revenge porn , written by Lisa Vaas on the aptly named site Naked Security (what else?), Just as we generate hash values of documents in eDiscovery to identify duplicates, the same type of technology can be applied to photos.