Author: R. Lance Fogarty
A court must follow certain rules when authorizing a special master; a special master cannot be granted “carte blanche authorization to sort through electronic storage devices.”
When a defendant was caught intentionally spoliating digital evidence on five laptops, executives tried to cover up the destruction of evidence, and lied on the stand.
The nation’s major mobile-phone providers are keeping a treasure trove of sensitive data on their customers, according to newly-released Justice Department internal memo that for the first time reveals the data retention policies of America’s largest telecoms.
Many factors must be considered when collecting any form of data from the cloud including a full understanding of your Service Agreement, the physical characteristics of the implementation, sharing resources with other clients, and more.
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by International Information Systems Security Certification Consortium also known as (ISC)².