By: Dr Tristan Jenkinson The issue of C-Suite executives (i.e. the top level executive managers of the company) requesting security exemptions from their IT teams has been highlighted by a MobileIron survey, reported on by Help Net Security here. The survey showed that just under 80% of C-Suite executives had requested to bypass security protocols … Continue reading Security Bypasses and the C-Suite
By: Tristan Jenkinson Introduction Having missed the recent ACEDS webinar on Forms of Production, I caught up this week thanks to a post over on Doug Austin’s eDiscovery Today Blog (which you can find here). The webinar contains many pearls of wisdom from Doug, Tom O’Connor, Director of Gulf Coast Legal Technology Center and Mike … Continue reading Potential Drawbacks of Non-Native Disclosure
By: Tristan Jenkinson Last month, the Ministry of Information Technology and Telecommunications for the Government of Pakistan issued a draft Data Protection Bill for consultation. You can get a copy here. This draft follows a previous draft issued in 2018 (also available from the above link). The contents contain many of the same concepts that … Continue reading The Pakistan Personal Data Protection Bill 2020 (PPDPB) – Released for Consultation
By: Tristan Jenkinson Yesterday (14 May 2020), the US Patent and Trademark Office (USPTO) published that Visa has filed for a patent to create a new digital cryptocurrency. The application is understood to have been originally filed in November last year, but has only just been published by USPTO. The patent does not necessarily mean … Continue reading VisaCoin? – Visa Patent Plans for New Cryptocurrency
By Tristan Jenkinson The United States Supreme Court has indicated that it will hear a case that should clarify how the Computer Fraud and Abuse Act (CFAA) should be interpreted. The result could affect how companies can pursue ex-employees for intellectual property theft and employee misuse of company data. The clarification relates to the specific … Continue reading Supreme Court to hear Computer Fraud and Abuse Act Case
By: Tristan Jenkinson Apologies I haven’t posted much recently, for which I apologise. I’m hoping get back to posting regularly now. eDiscovery Today For those who haven’t seen, Doug Austin has started a new blog – eDiscovery Today. Doug (in something of a contrast to the eDiscovery Channel) posts daily on matters relating to eDiscovery, … Continue reading Updates and a Case Law Strike Out
By: Tristan Jenkinson Background Last week, the Irish Data Protection Commission (“DPC”) announced that they had launched an inquiry into “Google’s processing of location data and transparency surrounding that processing”. You can see the press release here and read more from Reuters here. This is not the first involvement that the DPC have had with … Continue reading Hey Google, Where’s My Location Data?
By: Tristan Jenkinson Further warnings that audio and video evidence are now subject to manipulation. Misuse of Machine Learning An article in Legal Cheek today (which can be read here) discusses a case where deepfake technology was allegedly used to generate an audio recording of an individual issuing threats to another party over the phone. … Continue reading Deepfaked Evidence?
By: Tristan Jenkinson For those who have been following the Jeff Bezos hacking story, a report covering the forensic investigation of his iPhone has been made available online after it was obtained by Motherboard. You can see the Motherboard article here and the direct link to the report itself is here. The report in particular … Continue reading Jeff Bezos iPhone Hacking Report
By: Tristan Jenkinson “The essential purpose of a search order is not to provide early disclosure, but rather to preserve documents necessary for the proper conduct of litigation before these courts” An important judgement was made last week relating to search orders. The judgement covers a number of legal points, but in particular highlights that … Continue reading A Judgement on Search Orders