Information Week Writer Reviews E-Discovery Applications
Andrew Conry-Murray writes two reviews on e-discovery software. The first article, which discusses offerings from Clearwell, Kazeon, and Stored IQ is here. The second article, examining Guidance’s...
View Article(Some) Lawyers to IT: You guys deal with ESI, please.
An increasing number of attorneys are looking at IT departments and telling them its their job to develop and enforce policies on handling ESI, and Andrew Conry-Murray says that’s a good thing. In an...
View ArticlePaper Claims ‘Strong Passwords’ Accomplish Nothing
But make it hard on users, that is. The abstract (PDF) follows: We find that traditional password advice given to users is somewhat dated. Strong passwords do nothing to protect online users from...
View ArticleCase Summary: U-Haul Int’l; Authentication of Database Summaries and the...
Lumbermens Insurance company objected to a Trial Court’s admission of computer generated summaries of payments for loss adjustments produced by another insurance company. Each summary related to a...
View ArticleCase Summary: Elec. Mach. Enters.; Spoliation arising from a Bankruptcy Claim
Elec. Mach. Enters. v. Hunt Constr. Group, Inc. (In re Elec. Mach. Enters.), 416 B.R. 801 (Bankr. M.D. Fla. 2009) Procedural History: Adversary Proceeding arising from Chapter 11 filing by electrical...
View ArticleCase Summary: Carter; Authentication of Database Records discussed
United States v. Carter, 591 F.3d 656 (D.C. Cir. 2010) Procedural History: Appeal by a criminal defendant of a of a 150-month sentence imposed by the United States District Court for the District of...
View ArticleCase Blurb: Lebowitz; Authentication of ESI Discussed
The Defendant questioned the authenticity of email transcripts, “instant messages,” and “chats” due to the incompleteness and integrity of the evidence. “The requirement of authenticity . . . as a...
View ArticleSolid State Drives and the Future of Computer Forensics
John Dunn, in an article on TechWorld, cites a study that claims that firmware built into solid state hard drives (SSD’s) erase data, rendering current forensics technologies effective. From the...
View ArticleOdds and Ends
I just don’t get why people do this: Seven rent-to-own companies and a software maker are settling charges with the Federal Trade Commission that rental computers illegally used spyware that took...
View Article
More Pages to Explore .....