Blogs

Showing Blog Posts: 71–77 of 77 tagged Enterprise Defense

  • Authentication Requirement for Digital Evidence Admissibility

    by Stephen Wu on November 25, 2008

    The Bankruptcy Court in the Central District of California issued a decision in October following the Vinhnee approach to digital evidence authentication. It bears repeating that in order to have evidence considered by a jury (or a judge, in Bankruptcy court) it must first be authenticated in accordance with Federal Rules of Evidence Rule 901. The Bankruptcy Court in In re Vargas, --- B.R---, …

  • Why the CSO/CISO Should Care About eDiscovery Part -5-

    by Stephen Wu on November 13, 2008

    Part -5- eDiscovery Leads to Digital Evidence The path to enhanced CISO understanding of the importance (to the enterprise) of rock solid digital evidence generation must first traverse the twists and turns fo the electronic discovery process. The pathway through eDiscovery may best be described though what is called the Extended Electronic Discovery Reference Model (EEDRM). The model is extended…

  • Why The CSO/CISO Should Care About eDiscovery Part -4-

    by Stephen Wu on November 1, 2008

    Part -4- Recent Landmark Legal Precedents and Opinions Two important court decisions indicate an early trend underscoring the importance of eDiscovery and digital evidentiary issues to the CSO/CISO. The first case, In re Vee Vinhnee, 336 B.R. 437 (9th Cir. BAP 2005) is a precedent setting case in which the court excluded Amex's own corporate records offer of evidence necessary to establish its…

  • Security Implications of "Custody and Control"

    by Stephen Wu on October 25, 2008

    The terms "custody" and "control" should be very familiar to cyber-security stakeholders. We are, after all, concerned with internal security issues pertaining to role, access and location management as well as identity management. Note that data location means real or virtual, for those cloud type schema. It's well understood that data can't be protected unless we know what we want to protect, …

  • Why the CSO/CISO Should Care About eDiscovery - Part 2 -

    by Stephen Wu on October 24, 2008

    Legal risks related to electronic discovery present perhaps the most significant emerging enterprise information risk, but this new risk also provides a unique opportunity for the CSO/CISO to increase his or her strategic contributions to the enterprise. In everyday civil (and criminal) litigation. and regulatory investigations and proceedings, electronic discovery ("eDiscovery") presents perhaps…

  • Definitions Matter in Electronic Discovery

    by Stephen Wu on October 4, 2008

    Court decisions focusing on the format of production for electronically stored information (ESI) have typically taken a hard line on inartfully crafted discovery requests. The Federal Rules of Civil Procedure, as amended in 2006, permit a party to request ESI, and gives the requesting party the option to choose format (for example, native data format, .tiff, or even .pdf files). If the party…

  • Welcome to the eDiscovery, Digital Evidence and Cybersecurity Law Blog

    by Stephen Wu on September 30, 2008

    The information security and legal worlds began traveling on an accelerated convergence path in 2006. Two major developments contributing to this convergence: The 2006 amendments to the Federal Rules of Civil Procedure, and the tsunami of digital information destined to become digital evidence generated. Other legal developments involve constitutional issues involving privacy, identity theft, and…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 31 Oct 2014 08:06:17 -0400.
© 2014 EMC Corporation. All rights reserved.