The information security and legal worlds began traveling on an accelerated convergence path in 2006. Two major developments contributing to this convergence: The 2006 amendments to the Federal Rules of Civil Procedure, and the tsunami of digital information destined to become digital evidence generated. Other legal developments involve constitutional issues involving privacy, identity theft, and the Computer Fraud and Abuse Act (CFAA) to name just a few.
Today, information security technologies and policies are playing an increasingly important role in litigation (eDiscovery through trial) as well as in the traditional information security environment. CSO and information security professionals are finding themselves involved with the same aspects of information governance (aka information life cycle management issues) generation, identification, collection, search and authentication of digital evidence. Security professionals need to keep abreast of developments previously believed to reside well outsid their domain expertise. Yet, the convergence continues, and the wide gaps between legal and technology...well, they remain wide.
Jon Stanley, Steve Wu and I am here to help bridge that gap, and provide information technology oriented reporting about recent legal developments that affect the enterprise infrastructure security policies and processes, as well as laws, regulations, and court decisions that affect enterprises and individuals alike.
We encourage feedback from our readers, and look forward to bridging that gap.
DISCLAIMER: (applies to all posts) Nothing contained in this blog should be construed as, or considered to be, legal advice. If you require legal assistance, contact an attorney in your jursidiction.