The most promising approach to ediscovery of cryptocurrency transactions, for now, is through traditional digital forensics: imaging a hard drive and accessing the user’s wallet files and transaction history directly. Alternatively, some ediscovery professionals have subpoenaed users’ master keys.
This is the FTC’s fourth case enforcing Privacy Shield. It continues the FTC’s commitment to enforcing international privacy frameworks, making a total of 47 cases enforcing the Privacy Shield, the predecessor Safe Harbor framework, and the Asia Pacific Economic Cooperation Cross Border Privacy Rules framework.
Unstructured experimentation of blockchain solutions without strategic evaluation of the value at stake or the feasibility of capturing it means that many companies will not see a return on their investments.
The “open mic” of so many voice-assisted devices coupled with the nigh-ubiquitous network of “smart devices,” other gadgets and gizmos increasingly listening to everything said around them certainly presents opportunity for mistake – and, perhaps, hacking.
While the Apache Project has many supporting tools, such as the Nutch crawler and the Tika “filter pack,” which extend the capabilities of both Lucene or Solr, implementing a pure open source search solution takes significant effort.
One topic, however, that has gotten scant attention is what the GDPR will mean for litigators seeking discovery from Europe. Well, here is a prediction – U.S. courts will have little patience for GDPR compliance requirements if the result is a failure to preserve electronically stored information (ESI), a substantial delay in producing requested documents and data, or an outright refusal to produce the materials requested.
Recently, the Personal Data Collection and Protection Ordinance (“the Ordinance”) was introduced to the Chicago City Council.
While security (network security, IoT security, application-security) is a critical piece in privacy, privacy regulations like GDPR have additional elements like policy enforcement, monitoring, control and reporting, to flag and control a rogue IT administrator as an example, or someone internally casually looking at a customer’s private data. So a business can be secure, but still be non-GDPR compliant. And an insecure firm, is most definitely non-GDPR compliant.
The Cloud Security Alliance (CSA) today released the CSA Code of Conduct (CoC) Self-Assessment. An essential tool for those charged with General Data Privacy Requirements (GDPR) compliance, the CSA CoC Self-Assessment provides a transparent means for standardizing compliance initiatives.
Organizations that use the Microsoft Teams chat-workspace service but that also keep their Exchange e-mail server data on-premises now have new optional e-discovery, compliance content search, preview and export options.