Remove 2012 Remove 2014 Remove Computer and Electronics Remove Education
article thumbnail

Court Denies Request for Production of Forensic Image: eDiscovery Case Law

eDiscovery Daily

An item in dispute was a computer used by an employee when he was working for Finos, which was in the possession of those partners at the time of the dissolution and became their property. During discovery, the plaintiff learned that the Finos computer was in the possession of those partners, who were not parties to this litigation.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. And given that the UK police would raid its offices in July 2014, it had legitimate cause to be worried. So would the FBI breaking into my home and seizing my personal electronics. Definitely.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

E-discovery luminary and recipient of the Masters Conference Educator of the Year 2016, Mary provides ACEDS and its membership more than a decade of strong credibility and sound leadership within the e-discovery community. Wednesday, March 21: Brett Burney. Monday, March 26: Craig Ball.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Thurston granted the defendants’ motion to compel (in part), ordering the plaintiffs’ to “produce all emails and other documents sought by the defendants in the format demanded with the accompanying metadata from the native computer”. 2014: Part 1 , Part 2 , Part 3 , Part 4. 2012: Part 1 , Part 2 , Part 3 , Part 4. Cummins, Inc.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 4

eDiscovery Daily

denied the plaintiff’s motion for adverse inference sanctions despite evidence that the defendant had used evidence wiping software twice after being ordered to produce her personal computer, stating that the plaintiff “offers only bare speculation that any of its trade secrets or other data were actually transferred” to the defendant’s laptop.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Gartner (2021) has two related definitions: Digital Transformation: “can refer to anything from IT modernization (for example, cloud computing), to digital optimization, to the invention of new digital business models.”

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 1

eDiscovery Daily

Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. 2014: Part 1 , Part 2 , Part 3 , Part 4. 2012: Part 1 , Part 2 , Part 3 , Part 4. Here they are: 2018: Part 1 , Part 2 , Part 3 , Part 4. 2017: Part 1 , Part 2 , Part 3 , Part 4. So, what do you think?