Remove 2015 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Peck ordered the defendants “to revise their Responses to comply with the Rules”, specifically Rule 34(b)(2)(B) and Rule 34(b)(2)(C), amended in December 2015 requiring objections to be stated with specificity and directing that an objection must state whether any responsive materials are being withheld on the basis of that objection.

article thumbnail

Companies’ Right to Privacy

Data Protection Report

In contrast, the court ruled that the companies’ Stored Communications Act claim did not meet the standard for a preliminary injunction. Note that, in 2015, the U.S. 2443 (2015)) that the Fourth Amendment applied to hotel owners’ business records of guests’ names, addresses, and vehicles. Airbnb, Inc. Background. Patel (135 S.

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 15 These changes were intended to “enable the court[s] to keep a tighter rein on the extent of discovery.”16.

Privacy 94
article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

In fact, I remember starting a new job by flying to Auburn Hills, Michigan for the very first meeting of the Featherstone Group, a collection of automotive OEM executive and security professionals. After the NTSB released its 2015 report about aircraft hacking, very little action came of it. Could we hack into an airplane, for example.

article thumbnail

The Hacker Mind Podcast: A Hacker From Hollywood

ForAllSecure

It was said he would often sit in on his business meetings, while the others in the meetings would think she had no idea what they were talking about. Bluetooth mitigates the risk of collisions through its use of spread spectrum technologies. She listened tntently and this knowledge would become important later on.

article thumbnail

The Hacker Mind Podcast: Hacking High-Tech Cars

ForAllSecure

And there'd be no way to set the phone to vibrate during a meeting except by powering it off. A sophisticated set of encryption and electronics is at work inside the vehicle. As more and more automotive manufacturers start incorporating computer technology into their expensive BMWs, Mercedes Ferraris and Porsches.

article thumbnail

US Government Accountability Office Releases New Report On The Internet of Things (IoT)

Privacy and Cybersecurity Law

The GAO also convened a number of expert meetings during the drafting process, bringing together experts from various disciplines, including computer science, security, privacy, law, economics, physics, and product development. The average price of the unit in 2015 was $.40. Cloud computing. Ubiquitous connectivity.

IoT 40