Welcome to the eDiscovery, Digital Evidence and Cybersecurity Law Blog


Posted on

The information security and legal worlds began traveling on an accelerated convergence path in 2006. Two major developments contributing to this convergence: The 2006 amendments to the Federal Rules of Civil Procedure, and the tsunami of digital information destined to become digital evidence generated. Other legal developments involve constitutional issues involving privacy, identity theft, and the Computer Fraud and Abuse Act (CFAA) to name just a few. 

Today, information security technologies and policies are playing an increasingly important role in litigation (eDiscovery through trial) as well as in the traditional information security environment. CSO and information security professionals are finding themselves involved with the same aspects of information governance (aka information life cycle management issues) generation, identification, collection, search and authentication of digital evidence. Security professionals need to keep abreast of developments previously believed to reside well outsid their domain expertise. Yet, the convergence continues, and the wide gaps between legal and technology...well, they remain wide. 

Jon Stanley, Steve Wu and I am here to help bridge that gap, and provide information technology oriented reporting about recent legal developments that affect the enterprise infrastructure security policies and processes, as well as laws, regulations, and court decisions that affect enterprises and individuals alike. 

We encourage feedback from our readers, and look forward to bridging that gap. 

SWT

DISCLAIMER: (applies to all posts) Nothing contained in this blog should be construed as, or considered to be, legal advice. If you require legal assistance, contact an attorney in your jursidiction.

risk management legislation

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs