FAQ: Is Metadata a Part of an Electronic Record or Not?

The Texas Record

Recently, we have received many questions about metadata. Most of the inquiries about metadata revolve around two questions – What is metadata and why is it important. The purpose of this article is to discuss whether metadata is part of an electronic record and if so why.

Bulgarian Presidency Presents Progress Report and Points for Debate on ePrivacy

Hunton Privacy

On June 8, 2018, the Council of the European Union’s Bulgarian Presidency presented a progress report (the “Report”) on the draft ePR to the Transport, Telecommunications and Energy Council. The Report reflects on the amendments presented in the May 2018 Examination of the Presidency text. These questions relate to permitted processing of metadata, protection of terminal equipment, privacy settings and the balance between innovation and the safeguarding of confidentiality.

GUEST ESSAY: Why there’s no such thing as anonymity it this digital age

The Last Watchdog

Metadata spying. Metadata is worthy of a separate examination. Despite warnings from cybersecurity academics, whistleblowers or former NSA and CIA agents, the general public shows no animosity toward metadata surveillance. Perhaps this is due to government officials trying to smokescreen by saying “It’s just plain old metadata, don’t worry about it”; or vague laws which don’t clarify when we become subject to metadata surveillance.

Webinar: Finding the Right Information in Your Stockpiled Content

JKevinParker

On March 3, 2017 I presented an AIIM Webinar on how to make enterprise information more findable. AIIM auto-classification content analytics findability Information Architecture metadata Search Speaking Webinar

Dreading Your Content Migration Project? 7 Ways Robotic Process Automation Can Help

AIIM

Issues with Poor or Missing Metadata: Particularly for a file share, many of the documents will have little or no metadata associated beyond what's captured in the file information and any folder structures that are present. A significant benefit of migrating from a file share to an actual information management solution is the enhanced ability to search - but that requires that metadata be present and correct.

EUROPE: e-Privacy Regulation – changes regarding electronic communications and digital marketing

DLA Piper Privacy Matters

On 26 July 2019, at the level of the Council, the Finnish government has issued a revised (Council) proposal for the e-Privacy Regulation with some amendments concerning electronic communication content, data & metadata, and further processing of metadata. 6 – all electronic communications data (content and metadata); Art. 6b – electronic communications metadata; Art. 6c – further processing of electronic communications metadata.

Feds Allege Adconion Employees Hijacked IP Addresses for Spamming

Krebs on Security

The very first result in an online search for the words “Adconion” and “spam” returns a Microsoft Powerpoint document that was presented alongside this talk at an ARIN meeting in October 2016. ” A slide from an ARIN presentation in 2016 that referenced Adconion.

Data Strategy at Strata Data Conf New York

Perficient Data & Analytics

Presenters, Ted Malaska and Jonathan Seidman, detail guidelines and best practices from planning to implementation based on years of experience working with companies to deliver successful data projects.

In Search of Cases Where Production of Databases Has Been Ordered: eDiscovery Case Law

eDiscovery Daily

Here are three cases where parties were required to produce databases, or provide access to those databases or provide metadata from database systems: Advanced Tactical Ordnance Systems, LLC v.

NEW TECH: ‘Network Traffic Analysis’ gets to ground truth about data moving inside the perimeter

The Last Watchdog

You can get to the ground truth by extracting the metadata about the data that’s traveling on the network. Recently, ExtraHop was monitoring the metadata flowing through its own network when it discovered an anomalous connection that was rather quietly sending data outbound at a low rate. Imposter apps and browser extensions masquerading as legit tools represent a clear and present risk that companies must account for.

ProtonMail denies that it spies on users for government agencies

Security Affairs

Steiger pointed out the company provided metadata and so-called secondary data that could be used by law enforcement and intelligence agencies for surveillance purposes. “Metadata or secondary data that is available must be provided.

Competitive Advantages of Implementing Artificial Intelligence in Banking

InfoGoTo

Machines can also create descriptions of information inside documents, emails and recordings – a type of label called “ metadata ” – that makes the content easily searchable.

Experts spotted a rare Linux Desktop spyware dubbed EvilGnome

Security Affairs

The sample analyzed by Intezer was uploaded to VirusTotal by mistake, the presence of metadata that was not removed by the attackers revealed that the malicious code was created on July 4.

Further hardening glibc malloc() against single byte overflows

Scary Beasts Security

Inline vs. out-of-line metadata It's time for a brief foray into memory allocator design. glibc malloc is based on dlmalloc, which has an inline metadata design. Specifically, every buffer handed out to the program is preceded by a little piece of metadata indicating the size of the chunk and whether the previous chunk is free or not. However, the internal metadata for this allocator is mixed in with pages handed out as buffers to the calling program.

Henry J. Van Lennep (AC 1837) Sketches and Papers

Archives Blogs

Henry John Van Lennep (AC 1837), a noted 19th-century Christian minister, missionary, writer and educator, was born in Smyrna (present-day Izmir, Turkey) in 1815.

Paper 32

Username (and password) free login with security keys

Imperial Violet

Resident keys, on the other hand, require some state to be kept by the security key because they can be used without presenting their ID first. The fact that you can register more than one credential for a given domain means that it's important to set the metadata correctly when creating a resident credential.

Shining the Light on DPLA in Florida

Archives Blogs

These three institutions contribute metadata for their digital collections content as well as on behalf of several new content partners. We are doing this with the help of many volunteers around the state serving on our working groups , which focus on metadata , outreach , and training.

Four Skills Every Modern Records Manager Must Have Right Now

AIIM

Additional Suggestions: process automation, metadata management, information governance, social media governance, information management-related standards. Learn about your Industry: If your organization doesn’t have something like an “Our Industry 101” presentation or course, find a good book, training class, or other resource that will help you understand the broader industry and how it works.

Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys, Part Five

eDiscovery Daily

Lastly, with regards to question “Does the EDRM model seem more like a defense model than a plaintiff model, given that it is more focused on producing then presenting?

Google is taking action on deceptive installation tactics for Chrome Browser Extensions

Security Affairs

The additional changes are part of the Project Strobe presented by Google in October 2018 in the aftermath of the data breach that exposed data of over 500,000 users of its Google+.

Experts spotted the iOS version of the Exodus surveillance app

Security Affairs

The phishing sites used to deliver the threat contained links to a distribution manifest, which contained metadata such as the application name, version, icon, and a URL for the IPA file.

Success of AI in academic libraries depends on underlying data

CILIP

Stephan will make a presentation as part of breakout on breakout on data behaviour with Julian Schwarzenbach and Caroline Carruthers at the forthcoming CILIP Conference 2019 in Manchester, in which he will be focusing on the use of unstructured data in libraries.

2010 Olympic Torch Relay Photographs Now Available

Archives Blogs

This project was intended to test our digital preservation capacity – specifically, the ability to ingest large numbers of files and automatically upload access copies and descriptive metadata to our online database (powered by software called Access to Memory , or AtoM for short).

Describing web archives: Learning from Archive-It partners and friends

Archive-It

In case you missed it live, want to revisit anything, or share with your colleagues, the recording, presentation materials, and space for continued discussion are all now online here in the Archive-It Community Forum. Metadata consultant Rebecca Guenther then dove deeper into the metadata profile for archived websites that NYARC therefore incorporated into its multi-institutional cataloging workflow, noting opportunities for revision and adaptation to many more library contexts.

Media File Jacking allows manipulating media files users receive via Android WhatsApp and Telegram

Security Affairs

” Researchers presented four attack scenarios that see a malicious app manipulating media files sent to the recipient: Image manipulation.

e-Records 2018: Future-proof Approaches for Management and Preservation of Long-Term Email Records

The Texas Record

In my collaborative presentation with Brian Thomas, Electronic Records Specialist, we covered the basics of email management, but with an emphasis on what to do with those email records – such as executive correspondence – that should be kept long-term.

SAA 2017 Annual Meeting – Alike/Different

Archives Blogs

The presenters were consistent in discussing the need for accurate and appropriate metadata. A valuable takeaway was the concept of establishing a “System of Record” when it is necessary to have multiple metadata systems.

Archive-It Partner News, September 2018

Archive-It

In case you missed it: the half-day program included reports out from partners applying new metadata profiles and workflows, coordinating among inter-agency government record retention programs, and breakout discussions of half-a-dozen technology and planning topics. by the Archive-It team.

Setting up SAML SSO with Azure AD and Oracle EPBCS/PBCS

Perficient Data & Analytics

Continue with EPBCS configuration, generate Azure federation metadata and save as xml file, e.g., IdPmetadata.xml. Select ‘Import identity provider metadata’ and browse to upload the IdPmetadata.xml file saved earlier. Enable identity domain (cloud) credentials: EPBCS domain now presents both cloud and Azure sign on options: Additional Oracle Resources.

Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys

eDiscovery Daily

Are plaintiffs more motivated to request native files than defendants because they are more invested in using the metadata? Does the EDRM model seem more like a defense model than a plaintiff model, given that it is more focused on producing then presenting?

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

Is it technically possible (and reasonably easy) to capture?” : Content that proved more difficult–especially if it was deemed less important or already present in other collections–could be disregarded. “Is Kelly also briefly discussed an experimental workflow that uses Zotero to create descriptive metadata for web archives. Author: Steven Gentry.

The Functions of #eDiscovery

Information is Currency

Specifications must be agreed upon for how ESI will be delivered and it is typically delivered with accompanying metadata. The last function of eDiscovery is Presentation. Typically in litigation ESI is presented before a disposition, hearing, trial etc. If Information Governance is the process, a defensible presentation is the end product. In today’s information age Information Governance is essential to be prepared for eDiscovery.

FOIA 40

e-Records 2017: “Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365”

The Texas Record

Presentation materials from the conference are available on the e-Records 2017 website. Alexander Webb and Julia Johnson waiting to present at this years e-Records Conference. Here are a few key points for each principle as they were given in the presentation.

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

On the 5th of March, at the RSA conference, Ghidra has been presented to the public revealing the inner details of the Software Reverse Engineering (SRE) framework that National Security Agency used for more than a decade.

Zero-knowledge attestation

Imperial Violet

However, if we assume that certain classes of sites probably are going to use attestation, then users have a collective interest in those sites enforcing the same, transparent standard, and in them keeping their attestation metadata current. Maybe they would simply trust the browser to send it: the browser could keep a current copy of the attestation metadata and tell the site whether the device is certified or not. U2F/FIDO tokens (a.k.a.

Paralympic Torch Relay photographs now available

Archives Blogs

Reference code: AM1550-S10-F14-: The presentation of this series is somewhat different from the two other torch relay series we made available in the past year. The duplicate images were kept; some may have different titles, depending on the descriptive metadata present in the source file.

No Bates, No Problem for Native Files: eDiscovery Throwback Thursdays

eDiscovery Daily

It seems like many attorneys and some courts still have to learn that you can produce in native format and still support the idea of presenting in image format.

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

Beth, Kristen, and Laura presented a program in which they each brought their unique perspective to the management of social media as records within the Federal Government. Scheduling the Ephemeral: Creating and Implementing Records Management Policy for Social Media. Speakers.

FOIA 56

Enterprise World recap -- The Intelligent and Connected Enterprise

AIIM

I was pleased to see this chart from our The State of Intelligent Information Management: Getting Ahead of the Digital Transformation Curve report used in multiple presentations by OpenText executives during the event.

Top 7 Data Governance Blog Posts of 2018

erwin

So with the impetus of the General Data Protection Regulation (GDPR) and the opportunities presented by data-driven transformation, many organizations are re-evaluating their data management and data governance practices. The driving factors behind data governance adoption vary.