Remove 2013 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. I wrote the essay below in September 2013. So would the FBI breaking into my home and seizing my personal electronics. The meeting presenters try to spice things up. Very probably.

article thumbnail

Finding the treasure in governement information management

CILIP

Do they have different tolerances to information management risk? Treasure Another exotic, but ‘live’ part of David’s records collection are the War Risk Indemnity records. Regulatory load With burgeoning amounts of information and regulation, is the job getting harder? Who has the regulatory responsibility?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Bennett declined to sanction the parties for issuing boilerplate objections, but strongly warned them that the use of boilerplate objections in the future would place counsel and their clients at risk for significant sanctions. 2013: Part 1 , Part 2 , Part 3 , Part 4. Cummins, Inc. Texas Alcoholic Beverages Commission, et. Ensing, et.

article thumbnail

German DPAs Adopt Resolutions on Employee Privacy, Facial Recognition and EU Draft Regulation

Hunton Privacy

The growing use and accuracy of facial recognition technologies pose a significant risk to the public’s protected interests. Human Rights and Electronic Communications. The previous Conference was held in Bremen in October 2013. Biometric Facial Recognition Online. Increased public spending on IT security.

Privacy 40
article thumbnail

The Burden of Privacy In Discovery

Data Matters

Courts have frequently emphasized privacy concerns in these cases, where a party sought direct access to an opposing party’s computer systems under Rule 34(a)(1), which allows parties “to inspect, copy, test or sample. any designated tangible things.”36 For example, in John B.

Privacy 94
article thumbnail

The debate on the Data Protection Bill in the House of Lords

Data Protector

When we do the weekly supermarket shop online, we should be able to move our shopping list electronically. With offerings such as World-Check, it plays a key role in Europe and globally in helping many private sector firms and public authorities identify potential risks in their supply chains, customers and business relationships.

GDPR 120