Remove 2011 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

NIST Issues Guidelines on Security and Privacy in Public Cloud Computing

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) has issued draft Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144) (the “Guidelines”) for public comment. Ensure that the client-side computing environment meets organizational security and privacy requirements for cloud computing.

Cloud 40
article thumbnail

Four Times Self-Collection Went Wrong

eDiscovery Daily

However, there are several risks involved. Judge Matthewman granted the defendants a second chance but required both parties to collaborate in a robust meet and confer. Only one employee oversaw the collection process, and he described himself in court as “computer illiterate.” Over a year after the case ended, Green v.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Bennett declined to sanction the parties for issuing boilerplate objections, but strongly warned them that the use of boilerplate objections in the future would place counsel and their clients at risk for significant sanctions. 2011: Part 1 , Part 2 , Part 3 , Part 4. Cummins, Inc. Texas Alcoholic Beverages Commission, et. Ensing, et.

article thumbnail

White House Proposes Cybersecurity Legislation

Hunton Privacy

As we reported last week , on May 12, 2011, the Obama administration announced a comprehensive cybersecurity legislative proposal in a letter to Congress. These frameworks would be based on federally developed, risk-based standards tailored to each system’s specific needs and circumstances.

article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

These can come in a variety of forms we’ll discuss in more detail below, but the most common in a modern office setting is software monitoring, where a piece of software is installed onto employees’ computers, which can then track things such as web activity. The most obvious is performance tracking. In short, the results are mixed.

IT 127
article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

And there'd be no way to set the phone to vibrate during a meeting except by powering it off. A sophisticated set of encryption and electronics is at work inside the vehicle. Vamosi: In my book from 2011 When Gadgets Betray Us , I profiled a young Czech born streetwise car thief, an unlikely example of a high tech criminal.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud. Informed by over two decades and billions of online transactions, Ali Cloud is well prepared to meet the latest web-enabled threats. Alibaba Cloud. Amazon Web Services (AWS).

Security 120