Blogs

Showing Blog Posts: 61–64 of 64 tagged Compliance

  • Why the CSO/CISO Should Care About eDiscovery Part -3-

    by Stephen Wu on October 25, 2008

    Part -3- The Evolving Landscape of eDiscovery There are three forces that are having an increasingly important influence in the ongoing evolution of eDiscovery processes. The first is the overwhelming predominance of corporate information generated and stored electronically. The second force is the December 2006 amendments to the Federal Rules of Civil Procedure (FRCP) which for the first time in…

  • Why the CSO/CISO Should Care About eDiscovery - Part 2 -

    by Stephen Wu on October 24, 2008

    Legal risks related to electronic discovery present perhaps the most significant emerging enterprise information risk, but this new risk also provides a unique opportunity for the CSO/CISO to increase his or her strategic contributions to the enterprise. In everyday civil (and criminal) litigation. and regulatory investigations and proceedings, electronic discovery ("eDiscovery") presents perhaps…

  • Definitions Matter in Electronic Discovery

    by Stephen Wu on October 4, 2008

    Court decisions focusing on the format of production for electronically stored information (ESI) have typically taken a hard line on inartfully crafted discovery requests. The Federal Rules of Civil Procedure, as amended in 2006, permit a party to request ESI, and gives the requesting party the option to choose format (for example, native data format, .tiff, or even .pdf files). If the party…

  • Welcome to the eDiscovery, Digital Evidence and Cybersecurity Law Blog

    by Stephen Wu on September 30, 2008

    The information security and legal worlds began traveling on an accelerated convergence path in 2006. Two major developments contributing to this convergence: The 2006 amendments to the Federal Rules of Civil Procedure, and the tsunami of digital information destined to become digital evidence generated. Other legal developments involve constitutional issues involving privacy, identity theft, and…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 16 Apr 2014 16:08:36 -0400.
© 2014 EMC Corporation. All rights reserved.