This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Reflecting on the Wannacry ransomware attack, which is the lesson learnt e why most organizations are still ignoring it. The dropper, once copied on the computer, attempted to connect to a site and only if the connection failed, proceeded to install two components, a cryptolocker and an exploit.
Any data that can be identifiable on its own or combined with other information, both direct and indirect through electronic or non-electronic systems. Data controllers are the parties that determine the purpose and control the processing of data such as e-commerce platforms. General personal data v. specific personal data.
Think about technology like email, personal computers, the web, smart phones, social media, etc. And if the users haven’t been trained, or were trained maybe 30 minutes one time several years ago after a very expensive lesson in information management courtesy of an e?discovery
Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities. Founded in 1991 in Waterloo, Ontario, OpenText offers enterprise content management, networking, automation, discovery, security, and analytics services.
Discovery requests of the past had little reason to include text messages as a form of evidence. Corporate servers stored the data, regardless of how the email was sent or received (via mobile device or work computer). Unless subpoenaed, they may refuse to participate in discovery investigations. 4] Anthony J.
Historically, the scope of discovery under Rule 26 of the Federal Rules of Civil Procedure and its state law analogues was defined exclusively in terms of relevance, with privilege providing but a narrow exception. To be within the scope of discovery, an inquiry now must be both relevant and proportional.
Online skimming is an adverse activity of stealing payment information during card-not-present transactions by infecting e-commerce sites with sniffers. As the digital economy plays an increasing part in our lives, it is vital that electronic payments are secure, convenient, and accessible to all. Online skimming.
As Craig notes in the latest blog post on his terrific Ball in Your Court blog ( Electronic Storage in a Nutshell ), he finished the E-Discovery Workbook for the 2019 Georgetown E-Discovery Training Academy (which we covered here ). Hey, judges! This might be a good place to start!
Do they go to a community night course on computers? Among his favorites were the K&L Gates case law site , Ralph Losey’s e-Discovery Team® site and the EDRM web site. The Discovery Revolution , George L. e-Discovery for Everyone , Ralph Losey (available on Amazon here ). Pursue online education?
But, perhaps the best answer to this question lies in Craig Ball’s new primer – Processing in E-Discovery. In the Introduction, Craig says this: “Talk to lawyers about e?discovery discovery processing and you’ll likely get a blank stare suggesting no clue what you’re talking about. But I’m getting ahead of myself.
discovery obligations, but also understand the methodologies and technologies associated with managing eDiscovery. William Hamilton, legal skills professor and executive director of the University of Florida’s E-Discovery Project, led the course, which took place at Southeast University during the last two weeks of August.
E-discovery luminary and recipient of the Masters Conference Educator of the Year 2016, Mary provides ACEDS and its membership more than a decade of strong credibility and sound leadership within the e-discovery community. Mary is Executive Director of the Association of Certified eDiscovery Specialists (ACEDS).
See what I did there? ; o ) While I’m speaking at the University of Florida E-Discovery Conference today, let’s take a look at a couple of articles related to Internet of Things (IoT) devices that you need to know from an eDiscovery standpoint. What are the types of evidence out there? We need to know to win in this environment.”.
Throughout the case, the plaintiff claimed that the evidence needed to prove the case existed in emails stored on UBS’ own computer systems. That case and the subsequent rule changes effectively forced civil litigants into a compliance mode with respect to their proper retention and management of electronically stored information (ESI).
Actually, it started yesterday, with a few events, including the Welcome Reception and the Beer and Basics: e-Discovery 101 and Relativity Fundamentals session (serving beer and wine at an education session is OK with me!). PD189198 – Making the Team: How One Law Firm Supercharged e-Discovery.
Despite that, as the opinion noted, Schulton had previously acknowledged that he used a “mechanism called Take Out” to export his entire ScholarChip e-mail account, which included all of its contents dating back to 2014, to Schulton’s personal “One Drive” cloud storage account. Judge’s Ruling.
The EDRM has been a household name in the e-discovery and legal technology industry for 15 years. Join this lively and interactive session for a discussion about evolving standards and workflows in e-discovery and how they might be incorporated into a revised EDRM.
Shark Week on the Discovery Channel concludes this weekend, which means Case Week on the eDiscovery Channel (a.k.a., As a result, the defendant filed a motion, asserting that the plaintiff was duplicitous about the Facebook discovery in question and requested case dismissal. Judge’s Ruling.
When I spoke at the University of Florida E-Discovery Conference last month, there was a question from the live stream audience about a lawyer’s duty to disclose a data breach within his or her law firm. Please remove all laptops from docking stations & keep turned off. *No No exceptions*. And, Model Rule 1.4
One of the plaintiff’s alleged harassers left the company a mere two days after that, but his computer was wiped within 7 days of his last day at work. Noting that the “failure to preserve electronic evidence is covered by Fed.R.Civ.P. Noting that the “failure to preserve electronic evidence is covered by Fed.R.Civ.P.
In discussing this new capability, Craig states: “This is a leap forward for all obliged to place a litigation hold on the contents of Android phones — a process heretofore unreasonably expensive and insufficiently scalable for e-discovery workflows. Are you struggling with mobile device discovery? Everything old is new again.”.
Information such as name, title, e-mail address, phone number, office location and where information for each is stored on the network is important to be able to proceed quickly when issuing hold notices and collecting their data. Here are several of the key early activities that can assist in deciding whether to litigate or settle the case.
In Michael E. Electronic Arts, Inc., Three former NFL players claimed that Electronic Arts (EA) used their likenesses in the Madden NFL videogame series without authorization. Davis, et al. 10-cv-03328-RS, (N.D. April 3, 2018) , California Magistrate Judge Donna M. ” Case Background. ” Case Background.
Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud. Born from e-commerce giant Alibaba Group in Hangzhou, China, the cloud services provider offers content delivery networks (CDN), data storage, and relational database management in a scalable infrastructure.
which requires every discovery disclosure, request, response or objection be signed by an attorney of record. In Judge Grimm’s opinion, he calls Rule 26(g) is “the least understood or followed of the discovery rules.” and he clearly states that much of the blame for high priced e-discovery costs lies here. In Mancia v.
Myers (whose testimony the Court deemed credible and persuasive), found that each of the three computers he reviewed contained anti-forensic software (Advanced Mac Cleaner and CleanMyMac). The PHP Defendants’ Use of Anti-Forensic Software: The plaintiffs’ forensic expert, John T.
Sunday, I jumped on Amtrak’s Empire Builder, which carried me to Managing Electronic Records, Cohasset Associates’ preeminent conference in Chicago. Conference organizers focused on legal issues: litigation readiness, records production, e-discovery, risk mitigation, datamaps, and more. The only limitation is timeliness.
Like me, several of you are fans of Rob Robinson’s quarterly eDiscovery Business Confidence Survey on his Complex Discovery blog and he has just published the results of his Spring 2019 Survey , which are very interesting and I will (hopefully) post my normal analysis on that tomorrow. This is one of those weeks. In Craig’s post, Mueller?
Here are the remaining fifteen cases related to spoliation and sanctions below: Court Says Rule 37(e) Doesn’t Apply When Recording Was Intentionally Deleted : In Hsueh v. Court Grants Lesser Sanctions Against Defendant for Various Discovery Issues : In New Mexico Oncology v. Alabama Chief Magistrate Judge John E. Holdings, Inc.
In assessing the plaintiff’s motion, Judge O’Hara noted that “the parties agreed the surveillance video is a form of electronically stored information (“ESI”) subject to the preservation requirements of Rule 37(e)”. Case Background. I love you! Case opinion link courtesy of eDiscovery Assistant.
Cloudy, with a chance of meatballs As noted, the secondary theme -- not mutually exclusive with SharePoint -- was cloud computing. VP at AIIM) observed: “Cloud approaches to support document management are re-emerging but I was struck by the lack of e-mail management approaches being fully integrated into many of them.
In this litigation involving the performance of Apple devices after software updates, the Special Discovery Master entered an order authorizing the forensic imaging of the devices belonging to 10 of the more than 90 named Plaintiffs in order to allow Apple’s outside experts to performance test the devices. In the case In Re: Apple Inc.,
A frequent court appointed special master in electronic evidence, Craig is a prolific contributor to continuing legal and professional education programs throughout the United States, having delivered over 2,000 presentations and papers. Just take the e-mail instead. This is not that day. Let us show you ways not to deal with this.
Per FRCP Rule 26(g), attorneys must sign discovery requests, responses, and objections. Counsel signed the discovery response despite their hands-off approach. Only one employee oversaw the collection process, and he described himself in court as “computer illiterate.” 1] Gretchen E. Self-Collection Cases and Sanctions.
Pennsylvania Supreme Court Rules that Forcing Provision of Computer Password Violates the Fifth Amendment : In Commonwealth v. NON-PARTY DISCOVERY. Here are six cases last year where courts decided on non-party discovery requests: Court Denies Non-Party’s Request to Quash Subpoena in Telecommunications Dispute : In Fair v.
Sweet, among other rulings, issued an adverse inference sanction against one of the defendants for its failure to preserve text messages in the possession of a non-party, finding that defendant had control of the non-party’s text messages, given that he was contracted by the defendant and provided documents and gave a deposition during discovery.
Sponsor: This blog is sponsored by CloudNine , which is a data and legal discovery technology company with proven expertise in simplifying and automating the discovery of data for audits, investigations, and litigation. In an unusually long blog post for Craig’s blog (dare I say a “Losey-ian” length blog post?),
Topics E-mail , Collaboration , Groupware , Online Communications , Enterprise Software , Software , Oliver Marks Blogger Info Oliver Marks Bio Contact Biography Oliver Marks Oliver Marks provides seasoned independent consulting guidance to companies on the effective planning of Enterprise 2.0 The goal of course was to tell [.]
As I noted yesterday , the Women in eDiscovery (WiE), Houston Chapter, in partnership with South Texas College of Law and the Association of Certified E-Discovery Specialists (ACEDS), hosted the second annual “Legal Technology Showcase & Conference” yesterday. But I did attend the other sessions.
In discussing this new capability, Craig states: “This is a leap forward for all obliged to place a litigation hold on the contents of Android phones — a process heretofore unreasonably expensive and insufficiently scalable for e-discovery workflows. Are you struggling with mobile device discovery? Everything old is new again.”.
Davis showed the audience a slide quoting Andrew Ng, a computer scientist and professor at Stanford University: “If a typical person can do a mental task with less than one second of thought, we can probably automate it using AI either now or in the near future.” Davis, a partner with Hinshaw & Culbertson LLP in New York.
The Ernie Challenge posited a case with roughly 1 terabyte of data to collect and a final amount of 200 gigabytes of data to review, most of that e-mail with the balance being various types of financial data. Discovery Cloud: discoverycloud.nextpoint.com. By 2012, the products Craig Ball mentioned had materialized.
This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Booking online and getting e-tickets and confirmations on a smart phone are normal. Thus, computing resources are available on-demand at any time. There is virtually no paper today. Intelligent Capture.
where he is a Principal and the firm’s National e-Discovery Counsel. You have to deal more with text messages, because the employees aren’t going to use their e-mail. Honestly, I’m kind of lazy – all good computer people are a little bit lazy, which is what drives process improvement.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content