Another High Profile Cyber Security Breach Demonstrates Need For Cyber Diligence
In the most recent example among a growing list of high profile cyber security breaches, the Twitter account belonging to the Untied States Central Command (“Centcom”), one of the symbols of U.S....
View ArticlePresident Obama Announces Sweeping Cyber Legislation Primarily Aimed at...
Securing cyberspace is a daunting task. I have frequently pointed out on this blog, in a variety of contexts, including here in connection with my discussion of the Sony Pictures cyber terrorism...
View ArticleMLK’s Prophetic Words On Technology Ring True As Cyberspace Becomes Latest...
I came accross the text of Dr. Martin Luther King Jr.’s 1964 Nobel Lecture at Oslo, Norway, where he reminded us to not let our moral progress fall behind our progress in science and technology. How...
View ArticleObama Goes Cyber In Sixth State Of The Union, Resulting In Rare Applause From...
The annual State of the Union address fulfills an obligation of the Presidency set forth in Article II, Section 3 of the United States Constitution, requiring the President to literally give Congress...
View ArticleBusiness Owners Beware: Avoid the Temptation to Post Fake Reviews or Feedback...
Facebook, Twitter, Google Plus, LinkedIn, Angie’s List, and the list goes on and on. Today there are more sites than ever where users are invited to opine about their interactions with service...
View ArticleMy Message About E-Discovery and Digital Forensics During My Annual Return to...
Thursday February 12, 2015 is a special day. It is my yearly trip back to my alma matter, Seton Hall University School of Law, for my annual guest lecture / simulation on some of the complexities...
View ArticleForget the Oscars, This Week is En Banc Oral Argument in US v. Davis at the...
SPOTLIGHT ON US v. Quartavious Davis It may very well represent the most significant e-discovery case in the nation at this moment, and US v. Quartavious Davis takes center stage this week at the 11th...
View ArticleMatthew Adams Provides Analysis on the E-Discovery Issues in the Murder Trial...
Jayson Williams is a former NBA all-star who now spends his time dissecting hot button topics in sports and society on his CBS podcast. These days, Jayson leads a frank discussion with his guests from...
View ArticleVoicemail – The Forgotten Form of ESI Evidence
With so much emphasis on e-mail production in e-discovery cases, it is no wonder that other equally compelling forms of ESI evidence sometimes get lost in the shuffle. Voicemail can be powerful, but...
View ArticleIn Depth Analysis of Warrantless Cell Tower Data Debate on Privacy Law 360
Earlier this week, Privacy Law 360 ran my most comprehensive analysis on the warrantless cell tower data debate, to date. My piece featured expert technical details on precisely how cell tower data...
View Article
More Pages to Explore .....