Posted by: Margaret Rouse
“Even if you own a network or are responsible for its security and maintenance, you may not have the unfettered right to watch what network users are doing.” — Richard P. Salgado
Today’s WhatIs.com Word of the Day is fruit of the poisonous tree, a legal doctrine according to which any secondary evidence obtained indirectly through illicit means is inadmissible in court. Examples of such sources include evidence gained through eavesdropping, illegal wiretapping, coercive interrogations, unwarranted searches or improperly conducted arrests. Information obtained from those sources is inadmissible according to the law of exclusion. Continued…
What do you call the the destruction, alteration, or mutilation of evidence that may pertain to legal action?
ARMA 2013: Cloud, mobile-related e-discovery complications
In this Q&A with ARMA 2013 speaker Veeral Gosalia, learn how mobile devices and the cloud are complicating how organizations approach e-discovery strategy.
Guide to managing the e-discovery process
Although e-discovery can be complicated, time-consuming and expensive, it is necessary in order to avoid the costly fines associated with non-compliance.
Can You Hear Me Now? Gov’t. Surveillance and ‘Metadata’
Davis Scott blogs about the controversy surrounding U.S. government surveillance of the Internet and phone calls.