Get the news you want the way you want it: click the RSS button in the right corner to add this feed to your RSS reader, or click here to subscribe to this content. By subscribing, you’ll find this news on your Member Account page, and the latest articles will be emailed to you in your customized IndyBar E-Bulletin e-newsletter.

E-Discovery, Information Governance & Cyber Security Section News All Posts     

Page 1 of 3 • Next 15 Posts found

What happens when a computer that keeps you alive can also put you in jail?
Posted on: Feb 24, 2017

Where do you draw the line when the 4th Amendment creates a right to privacy and the 5th Amendment is meant to stop someone from incriminating themselves but meanwhile necessary technology inside a person's body is constantly collecting data?

Software helps assemble social media posts from a specific event or point in time
Posted on: Feb 17, 2017

Social media contains a potential treasure trove of information. It seems people’s first instinct nowadays is to reach for the smartphone while they witness a fight, traffic crash or crime, then log on to spill the details. The problem was trying to comb through all the selfies, pet portraits and other irrelevant information in a quick, cost-effective way.

Feds can't use US warrants to grab foreign data, says appeals court
Posted on: Feb 2, 2017

An appeals court has declined to revisit an earlier decision, ruling that the Justice Department cannot force Microsoft to turn over customer data stored on servers outside the U.S.

Why Your Business Absolutely Needs a Virtual Data Room
Posted on: Jan 26, 2017

A VDR prioritizes security and privacy, saves businesses money and may be the poster child for accountability.

Examining Forensics: Making and questioning various e-discovery requests
Posted on: Jan 24, 2017

The overwhelming problems in the discovery system are twofold. On one hand, a large number of judges self-admittedly do not understand the potential of the incredibly large and varying amount of devices, as well as their storage capabilities. On the other hand, the requests which are made tend to be so broad and burdensome that it complicates an already difficult situation.

Page 1 of 3 • Next