News & Analysis as of

Authentication Data Collection

CloudNine

Data Authentication in eDiscovery: Ensuring Integrity and Trust

CloudNine on

The Role of Experts in Data Collection - In many eDiscovery cases, teams of experts handle the collection of traditional and modern data following a proven, standard process. These experts ensure the data is authenticated,...more

EDRM - Electronic Discovery Reference Model

Authentication of a Disputed Email and Attachment

Boshea v. Compass Marketing, Inc., 2023 WL 2743333 (D. Md. Mar. 31, 2023)(Hollander, J.), involved authentication of disputed electronically stored information. “Authentication” is a necessary predicate to all uses of ESI:...more

Association of Certified E-Discovery...

[Webinar] Practical Applications of eDiscovery Rules - December 14th, 1:00 pm - 2:00 pm EST

We all know that there are Federal and State rules that govern how eDiscovery is conducted, but legal professionals need examples to illustrate how the rules should be applied, and what NOT to do. This webinar will use actual...more

Hanzo

When it Comes to Using Screenshots as Evidence, It’s All About Authentication

Hanzo on

Complex data sources – such as chat messages or a SaaS application’s user interface – are called that for a reason in the world of ediscovery: namely because it’s challenging to reproduce the data in a way that’s useful for...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #318 – IRS Abandons Use of Facial Recognition for New Accounts

The Internal Revenue Service previously announced in November 2021, that it would use facial recognition technology offered by ID.me to authenticate taxpayers before using any online services the IRS provides, including...more

Clark Hill PLC

Biometric Authentication: The Good, the Bad, and the Ugly

Clark Hill PLC on

TV and movies introduced biometric identification as a futuristic concept ages ago. Security on Star Trek was cutting edge with voice ID making sure the right personnel were in command of the Enterprise. Facial recognition,...more

Association of Certified E-Discovery...

[Webinar] Generating Self-Authenticating Digital Evidence That’ll Hold Up in Court - October 8th, 1:00 pm - 2:00 pm ET

The submission of digital evidence traditionally required a sponsoring witness—something that could be time-consuming and expensive. Thankfully, as more and more online content, such as social media posts and chats, play a...more

Association of Certified E-Discovery...

[Webinar] ACEDS Ohio Chapter and XDD: Updates on Social Media in eDiscovery - December 4th, 1:30 pm ET

For better or worse, social media has become an influential, indispensable part of our professional and personal lives. Its impact upon discovery is growing in parallel. New types of ESI are showing up as relevant evidence,...more

Arnall Golden Gregory LLP

Data Security 101 for Business – Guidance from the Federal Trade Commission

Recently the Federal Trade Commission (FTC) issued a guide, Start with Security: A Guide for Business, which pulls from lessons learned from the 50+ data security enforcement actions that the FTC has announced. To be clear,...more

Foley Hoag LLP - Security, Privacy and the...

Update on President Obama’s “Summit on Cybersecurity and Consumer Protection,” Part III: Five Key Lessons for Business

Concluding our three-part analysis of the White House’s first Summit on Cybersecurity and Consumer Protection, we turn to some practical advice coming out of the Summit’s afternoon session, including an address by Maria...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide