article thumbnail

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

The Last Watchdog

Metadata spying. Metadata is worthy of a separate examination. Despite warnings from cybersecurity academics, whistleblowers or former NSA and CIA agents, the general public shows no animosity toward metadata surveillance. Metadata can be used to reverse-engineer and pinpoint identity quite easily.

Metadata 218
article thumbnail

Harvesting Preservica metadata to your library discovery layer using APIs - Case Study: Preservica to Ex Libris' Primo

Preservica

Click below to watch the replay of this educational webinar. Challenges ProQuest supplied the theses in PDF format on hard drives in batches, each batch was accompanied by a file of metadata in MARC format. We realized that we needed to convert the metadata to a better format, split it by record, and ingest it into Preservica.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Court Denies Defendant’s Motion to Compel Production of Documents and Metadata: eDiscovery Case Law

eDiscovery Daily

Regarding the motion to compel accurate metadata, Judge Bryan stated: “GEO’s motion for an order compelling the State to produce accurate metadata should be denied. The post Court Denies Defendant’s Motion to Compel Production of Documents and Metadata: eDiscovery Case Law appeared first on CloudNine.

article thumbnail

Court Rules on Dispute over Native File Format Production and Metadata: eDiscovery Case Law

eDiscovery Daily

native files with metadata) and also ordered the defendants to file an itemization of costs and fees, including attorney’s fees, incurred in making the Motion to Compel. Some of Defendants’ filings could be interpreted to argue that Defendants are entitled to all metadata related to the documents previously produced. Case Background.

article thumbnail

New Ransom Payment Schemes Target Executives, Telemedicine

Krebs on Security

. “You need to create this file and inject into the machine(s) like this so that metadata would say that they were created on his computer,” they continued. Continuously educating and informing staff about the risks and methods used by cybercriminals to launch attacks and steal data.

article thumbnail

Department of Education Releases Guidance for Schools Regarding Terms of Service Offered by Providers of Online Educational Services

Hunton Privacy

The guidance, Protecting Student Privacy While Using Online Educational Services: Model Terms of Service, states that the TOS offered by providers of online educational services and mobile applications are often “Click Wrap” agreements requiring schools and districts to accept the TOS without an opportunity for negotiation.

article thumbnail

Information Governance – 3 Common Pitfalls and How to Avoid Them

AIIM

How to Avoid/Overcome: Overcome this issue by addressing objections directly with good communication and contextual education. Education and brainstorming with experienced, respected peers, other successful organizations, vendors, or integrator consulting teams can be powerful techniques.