It is the beginning of a new year and I thought it the ideal time to list out those steps that are absolutely critical when an attorney is confronting his/her obligation to produce e-discovery in connection with a litigation.
Unbeknownst to many, changes to the Federal Rules of Evidence governing the hearsay exception for ancient documents (FRE 803(16)), and additional rules governing self-authentication of evidence generated by electronic processes or systems (FRE 902(13)) and self-authentication of data copied from electronic sources (902(14)), are slated to become effective in 2017.
The Federal Trade Commission (FTC) filed a lawsuit against “D-Link Corporation and its U.S. subsidiary, alleging that inadequate security measures taken by the company left its wireless routers and Internet cameras vulnerable to hackers and put U.S. consumers’ privacy at risk.”
The Federal Trade Commission (FTC) “it is challenging the public to create an innovative tool that will help protect consumers from security vulnerabilities in the software of home devices connected to the Internet of Things.”
As we begin the new year, companies are continuing to survey the ever-changing data-breach landscape and assess their own preparedness for the worst. And with data security threats becoming more complex, sophisticated, and diverse every year, it is no small task.
December 2016 brought the US government some progress on prosecuting foreign cybercriminals. Last month, three Romanians were extradited to face charges in the US for running a cybercrime ring using custom-built malware and money mules to steal at least $4 million.
Eleventh Circuit Rejects Criminal Defendant’s Claim That Digital Technology Requires Increased Scrutiny of Federal Prosecutors’ Improper Review of Privileged Emails
The Eleventh Circuit recently refused to set aside a bank fraud conviction, rejecting defendant’s argument that advances in technology should change the way court’s adjudicate alleged violations of attorney-client privilege.
The FBI announced that “John Edward Taylor allegedly trolled dating websites to find unsuspecting women for his ‘romance’ scam, designed to steal their money.”
What discovery methods do you consider when you are strategizing about the most effective method to obtain the information you need and pin down your opponent?
When collecting electronically stored information (“ESI”) from multiple custodians (i.e., various individuals/ different sources), there will necessarily be duplicative documents collected in the process.