Links (weekly)
Posted from Diigo. The rest of my favorite links are here.
Follow these topics: Links
The Dangers of Do-It-Yourself eDiscovery: A Warning to Lawyers and Business Leaders.
tags: LitSupport MM
tags: LitSupport MM
The Growing Mobile Forensic Headache
tags: LitSupport MM
5 Tips for Breaking Into Litigation Support
tags: LitSupport MM
Bottom Line Driven Proportional Review
tags: LitSupport MM
Posted from Diigo. The rest of my favorite links are here.
Follow these topics: Links
When E-Discovery Became a Thing: Judges Reflect on Court’s ESI Evolution Zero to Sixty in Ediscovery: The Value of On- and Off-the-Job Training Why We Need to Talk about Mental Health Regularly at the Workplace “Not conducting exit interviews on your departing employees? You should be!” A Lawyer’s Obligation to be Technologically Competent – Part…
I recently purchased a new car, for the first time since 2002. One of the first things I noticed was how “connected” it is, to my phone, to trip data, to various apps, to it’s own internal information etc. Naturally, as an eDiscovery professional, I immediately started wondering about how that data is handled, and…
“Naked Security reports that a new survey shows users still prefer passwords over other authentication methods such as biometrics. The survey revealed that 58% of people prefer to use passwords for accessing online services. Fingerprints were the most popular biometric method at 10% and only 9% of those survey thought that collecting biometric data was…
Corporate Information Governance: Whose Job Is It Anyway? (Part II) Please Stop Reading Off Your PowerPoint Slides. Here’s What to Do Instead – It’s hard to believe we still have to tell anyone this, but we do. Do We Need To Recognize That We Have A Facial Recognition Problem? Does Virtual Reality Have A Place…
In this case, it wasn’t even that Nest had an insecure device, though that is often open to debate with Internet of Things devices. No, this was all about reusing passwords. “The method used to spy on the Thomases is one of the oldest tricks on the Internet. Hackers essentially look for email addresses and…