The U.S. International Trade Commission has adopted “final rules related to its e-discovery practices.” “The new rules will be effective 30 days after publication in the Federal Register and are applicable to investigations instituted 30 days after publication in the Federal Register”—a Federal Register notice was issued on May 15, 2013.
As cyber attacks against U.S. companies move markets, drain tens of millions dollars from bank accounts, siphon off trade secrets, and threaten critical infrastructure, the mantra among government officials is: sharing (information) is caring. The government’s desire to increase information sharing on cyber intrusions with the private sector is at the heart of an executive order issued in February—and it was a point underscored at a New York City Bar Association event on Monday, when Mary Galligan, who is an FBI “cyber cop,” urged corporations to come forward with information about attacks on their networks.
So what can and should companies expect when they ring up the government and report a problem? What sort of legal issues are going to arise? For this, we turn to Galligan’s afternoon panel on cyber crime, where she was accompanied by attorneys in private practice, a law professor, the head of a computer forensics firm, and the chief of the Manhattan District Attorney’s investigations division.
First, as Ed Stroz, of the investigative firm Stroz Friedberg, explained, it’s important to recognize that you could be attacked by different categories of attackers, including state-sponsored actors, organized criminal groups, individual hackers or “hacktivists,” and company insiders. Galligan added a group to the list: terrorists.
Data Inside TrueCrypt Containers is No Longer Hidden as Passware Kit Now Detects Hard Disk Images | PRNewswire | Rock Hill Herald Online
Passware, Inc., a provider of password recovery, decryption, and electronic evidence discovery software for computer forensics, law enforcement organizations, government agencies, and private investigators, announces that Passware Kit Forensic v.12.5 can now recognize hard disk images and containers, such as TrueCrypt, BitLocker, PGP, etc. during a computer scan. For a computer forensic professional this means that no evidence is hidden inside a volume.
During a computer scan, which typically takes less than an hour, Passware Kit Forensic displays all encrypted files and hard disk partition images. Previously, there was no way to identify quickly an encrypted container on a file system where important data could be hidden.
Amazon.com Inc has been given a security clearance by the U.S. government that will make it easier for federal agencies to use its cloud computing services.
Amazon Web Services, known as AWS, was certified to operate as a cloud service provider for three years under the government’s new FedRAMP program. The accreditation covers all AWS data centers in the United States, the company said on Tuesday.
“This will cut the cost and time for agencies to deploy our systems,” said Teresa Carlson, vice president of Worldwide Public Sector at AWS. “It cuts costs for AWS too.”
Amazon, the world’s largest online retailer, has moved aggressively into the business of renting remote computing, storage and other IT services in recent years through AWS.
For Good Cause Shown, Plaintiffs No Longer Required to Utilize Predictive Coding : Electronic Discovery Law
EORHB, Inc. v. HOA Holdings, LLC, No. 7409-VCL, 2013 WL 1960621 (Del. Ch. May 6, 2013)
Previously, the court ordered the parties to “retain a single discovery vendor to be used by both sides” and to “conduct document review with the assistance of predictive coding.” (See summary, here.) On May 6, the court entered a new order, stating that Defendants could retain their chosen vendor and utilize computer assisted review but that the parties would not be required to retain a single vendor to be used by both sides and that “Plaintiffs may conduct document review using traditional review methods.”