Reading – How to become an internal e-discovery expert
Lots of links to quality eDiscovery resources in this post. Naturally, I wanted to make sure you all saw them! How to become an internal e-discovery expert
Lots of links to quality eDiscovery resources in this post. Naturally, I wanted to make sure you all saw them! How to become an internal e-discovery expert
“Predictive coding tools have serious ROI beyond litigation, because employees can find what they’re looking for — quickly.” Makes sense to me. I’ve worked with some folks who are using their eDiscovery tools to simply store and index data that they may need to search at some point. Most of the time that decision is…
“As the Internet of Things continues to expand, so too will the sources of potentially material evidence. Xively, a part of LogMeIn, claims to connect 400 million devices, from usual suspects like computers down to individual light switches. The usefulness of that information those devices collect will continue to increase as IoT manufacturers improve their…
This article reminded me of a statistic I saw during a presentation on insider threats last week. In a recent survey, over one third of employees would willingly sell their passwords/access to anyone, some for as little as $150. See the problem here is that while so many people are starting to wake up to…
Gee, this doesn’t seem fairly crappy at all. Use an ad-blocker? Want that company to decide which ads you can see and which you can’t based mostly on who’s willing to pay them and agree to some “policy” that you don’t really get any say in as a user? That’s not exactly giving the end-user…
“Fingerprints are another type of data entirely. They’re used to identify people at crime scenes, but increasingly they’re used as an authentication credential. If you have an iPhone, for example, you probably use your fingerprint to unlock your phone. This type of authentication is increasingly common, replacing a password — something you know — with…