Remove 2013 Remove Computer and Electronics Remove Education
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

article thumbnail

The Sedona Conference Has an Updated Commentary on Rule 45 Subpoenas to Non-Parties: eDiscovery Best Practices

eDiscovery Daily

Last week, The Sedona Conference® (TSC) and its Working Group 1 on Electronic Document Retention & Production (WG1) announced the publication of the Public Comment Version of The Sedona Conference Commentary on Rule 45 Subpoenas to Non-Parties, Second Edition. So many stories, so little time. Been meaning to cover this for a few days now.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Announcing Eighth Annual LTNY Thought Leader Series!: eDiscovery Trends

eDiscovery Daily

E-discovery luminary and recipient of the Masters Conference Educator of the Year 2016, Mary provides ACEDS and its membership more than a decade of strong credibility and sound leadership within the e-discovery community. Wednesday, March 21: Brett Burney. Monday, March 26: Craig Ball.

article thumbnail

Plaintiff is Able to Get Some Subpoenas for Personal Data Quashed, But Not All: eDiscovery Case Law

eDiscovery Daily

To the extent these records mirror the electronic files found on the vessel’s computer and corroborate the other crewman’s statements, they are of vital importance to defendants’ theory of the case.

article thumbnail

Understanding eDiscovery in Criminal Cases, Part Four: eDiscovery Best Practices

eDiscovery Daily

So, it is no surprise that one of the growing electronic aspects of criminal law is social media as evidence. Furthermore, electronic evidence, such as social media, must be authenticated, that is shown to be what it is supposed to be. 433 (2013).by Working with Social Media as Evidence. Recent decisions, including Sublet v.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Thurston granted the defendants’ motion to compel (in part), ordering the plaintiffs’ to “produce all emails and other documents sought by the defendants in the format demanded with the accompanying metadata from the native computer”. 2013: Part 1 , Part 2 , Part 3 , Part 4. Cummins, Inc. Metadata Plays Key Role in $10.8 Ensing, et.

article thumbnail

Why Is TAR Like a Bag of M&M’s?, Part Two: eDiscovery Best Practices

eDiscovery Daily

The Grossman-Cormack glossary of 2013 used the phrase Coding” to define both TAR and PC and I think various parties then conflated the two. Ralph calls it the multi-modal approach: a combination of people and computers to get the best result. For several reasons I believe. Continued use of the terms interchangeably.