article thumbnail

CISA analyzed stealthy malware found on compromised Pulse Secure devices

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) published a security alert related to the discovery of 13 malware samples on compromised Pulse Secure devices, many of which were undetected by antivirus products. Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.

article thumbnail

Twenty-One Points, Less Than 350 Words: eDiscovery Best Practices

eDiscovery Daily

As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). Sometimes, you feel like a nut! ; o ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Yes, It’s Another Story About Coronavirus: eDiscovery and World Trends

eDiscovery Daily

Here are just a few impacts in the eDiscovery and legal technology world: The University of Florida E-Discovery Conference that was scheduled for this Thursday, March 19 in Gainesville, FL (and via Livestream) has been postponed. So, that leaves many of us to exercise our Business Continuity plans and perform our duties remotely.

article thumbnail

U.S. CLOUD Act and International Privacy

Data Protection Report

Supreme Court relating to stored e-mails controlled by a U.S.-based The e-mails in that case were stored in Ireland, and the provider argued that reach of the U.S. order for the e-mails (in a criminal case) stopped at the U.S. enacted the CLOUD Act in 2018 in response to a case pending before the U.S. based provider.

Cloud 40
article thumbnail

EDRM Announces Five New Projects: eDiscovery Best Practices

eDiscovery Daily

The goals of this project are to build frameworks for data mapping exercises, and provide clear guidelines on what the process should look like, because the better an organization understands its data, the cheaper it is to comply with any discovery or investigation obligations.”.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Historically, the scope of discovery under Rule 26 of the Federal Rules of Civil Procedure and its state law analogues was defined exclusively in terms of relevance, with privilege providing but a narrow exception. To be within the scope of discovery, an inquiry now must be both relevant and proportional.

Privacy 97
article thumbnail

eDiscovery and the GDPR: Ready or Not, Here it Comes, Part Four: eDiscovery Best Practices

eDiscovery Daily

He has also been a great addition to our webinar program, participating with me on several recent webinars, including our webinar last Friday on E-Discovery Day ( Murphy’s eDiscovery Law – How to Keep What Could Go Wrong From Going Wrong ), which was great. If you missed it, you can check out the replay here.

GDPR 34