Quantcast
Channel: Post Process » Uncategorized
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Information Week Writer Reviews E-Discovery Applications

Andrew Conry-Murray writes two reviews on e-discovery software. The first article, which discusses offerings from Clearwell, Kazeon, and Stored IQ is here. The second article, examining Guidance’s...

View Article



Image may be NSFW.
Clik here to view.

(Some) Lawyers to IT: You guys deal with ESI, please.

An increasing number of attorneys are looking at IT departments and telling them its their job to develop and enforce policies on handling ESI, and Andrew Conry-Murray says that’s a good thing. In an...

View Article

Image may be NSFW.
Clik here to view.

Paper Claims ‘Strong Passwords’ Accomplish Nothing

But make it hard on users, that is. The abstract (PDF) follows: We find that traditional password advice given to users is somewhat dated. Strong passwords do nothing to protect online users from...

View Article

Image may be NSFW.
Clik here to view.

Case Summary: U-Haul Int’l; Authentication of Database Summaries and the...

Lumbermens Insurance company objected to a Trial Court’s admission of computer generated summaries of payments for loss adjustments produced by another insurance company. Each summary related to a...

View Article

Image may be NSFW.
Clik here to view.

Case Summary: Elec. Mach. Enters.; Spoliation arising from a Bankruptcy Claim

Elec. Mach. Enters. v. Hunt Constr. Group, Inc. (In re Elec. Mach. Enters.), 416 B.R. 801 (Bankr. M.D. Fla. 2009) Procedural History: Adversary Proceeding arising from Chapter 11 filing by electrical...

View Article


Image may be NSFW.
Clik here to view.

ABA’s Chart Comparing Lit Support Applications

May be found here. Note it is a PDF.

View Article

Image may be NSFW.
Clik here to view.

Case Summary: Carter; Authentication of Database Records discussed

United States v. Carter, 591 F.3d 656 (D.C. Cir. 2010) Procedural History: Appeal by a criminal defendant of a of a 150-month sentence imposed by the United States District Court for the District of...

View Article

Image may be NSFW.
Clik here to view.

Case Blurb: Lebowitz; Authentication of ESI Discussed

The Defendant questioned the authenticity of email transcripts, “instant messages,” and “chats” due to the incompleteness and integrity of the evidence. “The requirement of authenticity . . . as a...

View Article


Image may be NSFW.
Clik here to view.

Solid State Drives and the Future of Computer Forensics

John Dunn, in an article on TechWorld, cites a study that claims that firmware built into solid state hard drives (SSD’s) erase data, rendering current forensics technologies effective. From the...

View Article


Image may be NSFW.
Clik here to view.

Odds and Ends

I just don’t get why people do this: Seven rent-to-own companies and a software maker are settling charges with the Federal Trade Commission that rental computers illegally used spyware that took...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images