Unsecured Database Leaves 8.4TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4TB of email metadata.

Unsecured Database Leaves 8.4 TB of Email Metadata Exposed

Data Breach Today

TB of email metadata. Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4

Identifying People by Metadata

Schneier on Security

Interesting research: " You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information ," by Beatrice Perez, Mirco Musolesi, and Gianluca Stringhini. Yet, surprisingly, metadata are often still categorized as non-sensitive.

Metadata Best Practices

IG Guru

Metadata is structured data about data, information that facilitates the management and use of other information. The function of metadata is to provide your users with a standardized means for access to digitized materials. However, it is not enough to use just any metadata standard.

Four Use Cases Proving the Benefits of Metadata-Driven Automation


Organization’s cannot hope to make the most out of a data-driven strategy, without at least some degree of metadata-driven automation. Metadata-Driven Automation in the BFSI Industry. Metadata-Driven Automation in the Pharmaceutical Industry.

Facebook Faces New Uproar: Call and SMS Metadata

Data Breach Today

Users Surprised By Metadata Collection, But Facebook Says It Always Asked Facebook is facing a new controversy after some users say they've found records of phone calls and text messages in their personal files, but claim they never granted the social networking site permission to collect the data

Revenge of the Metadata Nerds


A variety of Nick Burns characters have also long lectured on the importance of metadata. Metadata is another area in which we’ve all had unrealistic expectations that users would help us with this key task. I’m John Mancini, and I have neglected my metadata responsibilities.

Shanghai Jiao Tong University data leak – 8.4TB in email metadata exposed

Security Affairs

Security expert discovered an exposed database belonging to Shanghai Jiao Tong University containing 8.4TB in email metadata. The exposed database containing 8.4TB in email metadata was discovered on May 22, 2019, through a Shodan search. .

Australian federal police accessed journalists' metadata 58 times in a year

The Guardian Data Protection

MPs are examining impact of national security laws on freedom of the press The Australian federal police has revealed it accessed the metadata of journalists 58 times in the 2017-18 financial year.

Metadata Requirements for Permanent Electronic Records in the Cloud

National Archives Records Express

If you have Federal records in the cloud, additional metadata might need to be applied to maintain relational links between records stored in the cloud and in local storage. You should assess metadata requirements before records are transferred to or created in the cloud. Also, the contract between the agency and the cloud service provider should include minimum metadata requirements. General cloud cloud computing electronic records management metadata

14 top metadata management platforms

Information Management Resources

Alation, ASG Technologies, Informatica and Smartlogic are among the top providers of metadata management tools, according to a new Magic Quadrant study from Gartner. Data management Data strategy Data types

Metadata Requirements for Permanent Records on Shared Drives

National Archives Records Express

Measures must be put in place to ensure the records have the minimum metadata required in NARA Bulletin 2015-04: Metadata Guidance for the Transfer of Permanent Electronic Records. Metadata for records maintained in a shared drive must be managed and retrievable. General metadata shared drives

A Likely Chinese Hacker Crew Targeted 10 Phone Carriers to Steal Metadata

WIRED Threat Level

In one case, they stole the location and call record data of 20 specific individuals. Security Security / Cyberattacks and Hacks

Managing Metadata for Permanent Records: What if the metadata required for transferring permanent records are stored separately from the records themselves?

National Archives Records Express

To follow our last post on Metadata Requirements for Permanent Records on Shared Drives , today we are discussing how to manage metadata for permanent records stored separately from the records. Required metadata, as specified in NARA Bulletin 2015-04 , must have the same retention and disposition as the records they describe whether maintained in a separate system, records management application, or case management system. General metadata shared drives transfer guidance

The importance of metadata in enterprise search and aggregation

Information Management Resources

While there are several approaches to metadata strategies, it is the impact on, and value for, searching and aggregating large document sets that is an essential consideration for today’s enterprises. Data types Data visualization Data mining

Off the Record: Combatting Disinformation Through Metadata, 2010-2018 IG Status, Permanent Electronic Records

The Texas Record

“ Reading Metadata to Combat Disinformation and Fake News Campaigns “ — UT iSchool. Metadata traditionally receives a positive connotation in records management as an element that brings authority and authenticity to a piece of information.

Training Snapshot: Metadata Searching from CloudNine

eDiscovery Daily

The post Training Snapshot: Metadata Searching from CloudNine appeared first on CloudNine. Analysis Electronic Discovery Identification Training

FAQ: Is Metadata a Part of an Electronic Record or Not?

The Texas Record

Recently, we have received many questions about metadata. Most of the inquiries about metadata revolve around two questions – What is metadata and why is it important. The purpose of this article is to discuss whether metadata is part of an electronic record and if so why.

It’s Time to End the NSA’s Metadata Collection Program

WIRED Threat Level

Opinion: Congress needs to pull the plug and end the authority for the CDR program. Security Opinion

Data-Driven Enterprise Architecture: Why Enterprise Architects Need to Look at Data First


The typical notion is that enterprise architects and data (and metadata) architects are in opposite corners. With governance, which sets its fundamental components firmly on data, metadata and infrastructure. It’s time to consider data-driven enterprise architecture.

Court Rules on Dispute over Native File Format Production and Metadata: eDiscovery Case Law

eDiscovery Daily

native files with metadata) and also ordered the defendants to file an itemization of costs and fees, including attorney’s fees, incurred in making the Motion to Compel. In Metlife Inv’rs. USA Ins. Lindsey, No. 2:16-CV-97 (N.D. 25, 2018) , Indiana Magistrate Judge John E.

What’s Business Process Modeling Got to Do with It? – Choosing A BPM Tool


The lack of a central metadata repository is a far too common thorn in an organization’s side. A central metadata repository ensures an organization can acknowledge and get behind a single source of truth.

Tools 74

Constructing A Digital Transformation Strategy: Putting the Data in Digital Transformation


Organizations need a real-time, accurate picture of the metadata landscape to: Discover data – Identify and interrogate metadata from various data management silos. Harvest data – Automate metadata collection from various data management silos and consolidate it into a single source.

Metadata from Photos Leads to Dismissal of Case Against New York City: eDiscovery Case Law

eDiscovery Daily

While the plaintiff’s counsel (Jason Leventhal) objected to that request, he did agree to produce the photographs’ native files, which included metadata. The post Metadata from Photos Leads to Dismissal of Case Against New York City: eDiscovery Case Law appeared first on CloudNine.

Five Benefits of an Automation Framework for Data Governance


In data governance terms, an automation framework refers to a metadata-driven universal code generator that works hand in hand with enterprise data mapping for: Pre-ETL enterprise data mapping. Governing metadata.

Court Denies Defendant’s Request for Protective Order Against Producing Metadata for Medical Records: eDiscovery Case Law

eDiscovery Daily

Madden, despite the defendant’s estimated cost of $250,000 to produce metadata related to the plaintiff’s medical records, denied the defendant’s motion for a protective order and granted the plaintiff’s cross-motion to compel the production of that metadata within 30 days of the decision and order.

Chinese Hackers Play Operator With Global Telcos

Data Breach Today

Cell Networks Hacked by (Probable) Nation-State Attackers

Schneier on Security

attribution cellphones datacollection espionage hacking metadata vulnerabilities

Using Strategic Data Governance to Manage GDPR/CCPA Complexity


Activating their metadata to drive agile data preparation and governance through integrated data glossaries and dictionaries that associate policies to enable stakeholder data literacy.


Governance in Healthcare: Ownership and Consistency

Perficient Data & Analytics

End-users are gaining more control of these assets, including the ability to integrate and manipulate them for their own purposes, and being able to select assets based on a relevance criteria not necessarily codified in classic metadata or semantic models.

Data Mapping Tools: What Are the Key Differentiators


BFSI, PHARMA, INSURANCE AND NON-PROFIT) CASE STUDIES FOR AUTOMATED METADATA-DRIVEN AUTOMATION. As stated above, a data governance platform that draws from a single metadata source is even more advantageous here.

Tools 85

Introducing a new Admin Insights Dashboard and Metadata-Driven Retention


Business today is more agile and global than ever before. The shift in the way work gets done has led to a massive increase in business efficiency and team productivity, with more and more organizations leveraging the power of the extended enterprise.

NSA Ordered to Stop Bulk Telephony Metadata Program

Hunton Privacy

Leon issued a preliminary injunction ordering the National Security Agency to stop its bulk telephony metadata program. On November 9, 2015, U.S. District Judge Richard J. The preliminary injunction was issued in favor of subscribers of Verizon Wireless Business Network and comes 20 days before the program was set to expire under the USA Freedom Act. The case is Klayman v. Obama et al. (1:13-cv-00851) 1:13-cv-00851) in the U.S. District Court for the District of Columbia.

Under Rule 34, production that is not ‘naturally organized’ must be labeled


Blog Case Law discovery ediscovery ESI FRCP 34 metadata motion to compel production responsive Rule 34The post Under Rule 34, production that is not ‘naturally organized’ must be labeled appeared first on Zapproved.

Data Governance Stock Check: Using Data Governance to Take Stock of Your Data Assets


A number of best practices and technology solutions were used to establish the data required for managing the registration and classification of data feeds: The underlying metadata is harvested followed by an initial quality check. For regulatory compliance (e.g.,

Measure Twice, Cut Once: How the Right Data Modeling Tool Drives Business Value


The chosen data modeling tool should be able to read the technical formats of each of these platforms and translate them into highly graphical models rich in metadata. Design-layer metadata can also be connected from conceptual through logical to physical data models.

Tools 70

Responsibility of Data Architecture in Data Governance

Perficient Data & Analytics

In addition, the establishment of common metadata principles is required to enable interoperability of tools across the capability areas.

Keeping Up with New Data Protection Regulations


Providing metadata and value-based analysis – Simplify the discovery and classification of sensitive data based on metadata and data value patterns and algorithms.

Data 88

Data Preparation and Data Mapping: The Glue Between Data Management and Data Governance to Accelerate Insights and Reduce Risks


Organizations have spent a lot of time and money trying to harmonize data across diverse platforms , including cleansing, uploading metadata, converting code, defining business glossaries, tracking data transformations and so on. What’s needed to overcome these obstacles is establishing an automated, real-time, high-quality and metadata- driven pipeline useful for everyone, from data scientists to enterprise architects to business analysts to C-level execs.

Demo 40

Production of emails in PDF format violates Rule 34 and the court’s order


Blog Case Law discovery ediscovery form of production FRCP 34 metadata motion to compel native format PDF production Rule 34 Sanctions ScopeThe post Production of emails in PDF format violates Rule 34 and the court’s order appeared first on Zapproved.