Category Archives: Information Security

Cloudy Laws II – Only 65 Challenges to eDiscovery Forensics in the Cloud

Among the many types of challenges presented by the adoption of cloud computing are those involving computer forensics. Computer forensics can be thought of as the set of tools and techniques that make eDiscovery possible and reliable. It is defined … Continue reading

Posted in Cloud Computing, Cloud Forensics, Computer Forensics, Document Retention Policies, eDiscovery, Information Security, Information Technology, Privacy, Vendor Contracts | Tagged | Leave a comment

Cloudy Laws – Part I

Cloud computing presents innumerable opportunities and brings with it enormous security and legal challenges. While there is no single accepted definition of the “cloud,” the National Institute of Standards and Technology created a reference model in 2011. NIST defined cloud … Continue reading

Posted in Cloud Computing, eDiscovery, Information Security, Privacy, Vendor Contracts | Leave a comment

LocationGate – Where in the World Was Waldo?

Just look at his iPhone data Apparently I am not the only person troubled by the recent revelation that Google and Apple collect location data from smart phones.  Mike Elgan wrote a thoughtful piece for Computerworld. Who owns your location? … Continue reading

Posted in Document Retention Policies, eDiscovery, Information Security | Tagged , , | Leave a comment