News & Analysis as of

Computer Servers

Addressing the Inconsistent Email Address: eDiscovery Best Practices

by CloudNine on

I recently had a client who was trying to search a fairly sizable archive in CloudNine (about 2.75 TB comprised of several million documents) and searching for emails to and from a given custodian. That search proved a...more

Securing Your Home’s Digital Entry Points

We’re all concerned with our home’s physical security, but so often we forget to pay the same amount of attention to our digital security. However, leaving your home’s digital entry points open is like leaving your front door...more

The Fourth Amendment Implications of Sharing Server Space

The prosecution of Martin Shkreli, whom the BBC has called “the most hated man in America,” reveals some important lessons about the Fourth Amendment protections against search and seizure in the digital corporate context:...more

California Amends its Data Breach Statute…Again

by Selman Breitman LLP on

The California Legislature has again amended California's Data Breach Statute regarding the obligations of companies to disclose the breach of personal information stored in computerized data. (California Civil Code Section...more

China’s Controversial New Cybersecurity Law

Earlier today, the Chinese government in Beijing approved a sweeping new cybersecurity law aimed at centralizing control over computer networks operating within China’s borders. The new law is broadly drafted and...more

Senate hearing reviews ransomware in a school system

On May 18, the Senate Judiciary Committee Subcommittee on Crime and Terrorism heard from Charles C. Hucks, the Executive Director of Technology for the Horry County, South Carolina, School System. The 52 schools and the...more

Benefits of using thin and zero client’s vs desktop PC’s

What are “thin clients” and their close cousins “zero client devices”? You probably have a desktop computer or laptop computer at work and all the software you use is installed on that computer. Although your data is...more

FTC Settles with Router Manufacturer for Security Failure

by Davis Wright Tremaine LLP on

As the number of smart devices in homes connected to the Internet continues to grow, the need to keep home networks secure becomes increasingly important. Device manufacturers that promise to secure these home networks,...more

ASUS settles with FTC over insecure home routers

ASUS TeK Computer, Inc. (ASUS) has agreed to settle with the FTC over allegations that “critical security flaws in its routers put the home networks of hundreds of thousands of consumers at risk.” The FTC further alleges that...more

Canada’s role in international botnet takedown

by Dentons on

The Canadian Radio-television and Telecommunications Commission (CRTC) has served its first warrant under Canada’s Anti-Spam Law (CASL) to take down a Toronto-based command and control server.  The malware family...more

Beyond the Clouds: Important Sales Tax Considerations for Web-Hosting Providers and Co-Location Facilities

by Hodgson Russ LLP on

Most people’s understanding of the Internet extends about as far as their eyes can see. In other words, they know that if they type a few words into the little white box beneath the colorful Google logo, within a fraction of...more

The Russian Data Protection Authority, Roskomnadzor, Enforces New Russian Data Localization Law

by Morrison & Foerster LLP on

On September 9, 2015, the Federal Service for Supervision of Communications, Information Technology and Mass Communications (the “Roskomnadzor”) reported on its website that it blocked an extensive online database of more...more

Cloud Computing: Not Always the Low Cost Alternative

There is no doubt cloud computing has delivered multiple benefits to the IT organization. However, without proper management and controls, these benefits could become a non-trivial expense to the organization. In a Wall...more

Cyber risk: Why cyber security is important - We live in an increasingly networked world, from personal banking to government...

by White & Case LLP on

Cyber risk is now firmly at the top of the international agenda as high-profile breaches raise fears that hack attacks and other security failures could endanger the global economy. The Global Risks 2015 report,...more

Dawn raids under scrutiny again by European Human Rights Court

by White & Case LLP on

ECtHR rules that French dawn raids in Vinci/GTM case breached fundamental rights - The European Court of Human Rights (the “ECtHR”) has ruled in the Vinci case that the circumstances surrounding the electronic removal of...more

Is Hosting Microsoft Products via Third Parties a Good Option?

by Scott & Scott, LLP on

Scott & Scott, LLP attorney, Christopher Barnett,, helps you answer whether hosting Microsoft products through third parties is a good option for your company....more

EOIR Reports Progress on Computer System Failure

As previously reported, at midnight on April 12, 2014, the Executive Office for Immigration Review (EOIR) experienced a catastrophic hardware failure that rendered inaccessible many of its applications. As a result, many...more

DOE Boldly Goes Where It’s Not Allowed

by LeClairRyan on

In an astonishing display of chutzpah, the Department of Energy has proposed to regulate computer servers as “consumer products” (link). Only in a bureaucrat’s mind could a computer server be considered a consumer product...more

18 Results
|
View per page
Page: of 1
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.