Search for: "Electronic Data Systems Corporation" Results 81 - 100 of 2,109
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Nov 2015, 5:00 am by Jennifer Daskal, Andrew Woods
The focus is necessarily US-centric, since, at least currently, it is US-based corporations that manage the bulk of the world’s data, and it is US law that imposes the greatest barriers to foreign law enforcement seeking access to this data. [read post]
4 Jun 2014, 1:13 pm by Tina Gheen
  In the past, these tasks were confined to the paper version of the document only, but now they also include electronic documents and data. [read post]
24 Jan 2007, 8:42 am
Press release:   Catalyst's sub-second search speed against large documents volumes and simple but powerful interface recognized by LTN readers as compelling features for large scale electronic discovery review systems DENVER, Colorado (January 17, 2007)—Catalyst Repository Systems, a leading provider of web-based repository software for case, deal and electronic document management, announced today that Catalyst CR has been selected… [read post]
6 Dec 2022, 6:46 am by sydneygallek
WakeMed Data Breach Representation Maginnis Howard’s consumer protection attorneys have experience holding large corporations accountable for their actions. [read post]
28 Feb 2017, 9:55 am by Mieke Eoyang, Gary Ashcroft
” The NSA’s Special Source Operations (SSO) division partners with the corporate owners of these networks to gather data at certain key points, like at network routers or switches. [read post]
20 Dec 2007, 2:27 am
A recent article in the Metropolitan Corporate Counsel provides a nice explanation of how to implement a data cataloging and mapping program. [read post]
29 Nov 2006, 1:05 pm
" * 54 percent of corporate counsel attorneys said their company does not have a designated technical witness for deposition about electronic data systems and management—a so-called 30(b)(6) deponent. [read post]
31 Jan 2007, 8:54 pm
Under FRCP Rule 26(b), parties in litigation must produce all electronically stored information that is relevant, not privileged and “reasonably accessible,” which includes information that resides online on a corporation’s desktops, laptops, servers, and networked storage systems. [read post]
16 Jan 2008, 1:04 am
The system is based on EMC's leading electronic content management system, EMC Documentum OEM edition, and handles data that have been generated by the IN Cell Analyzer and similar systems. [read post]
12 May 2023, 5:31 pm by Sean Hayes
VASPs in Korea should be aware that the Bank of Korea may request data for the implementation of monetary and credit policies, financial stability, and the operation of payment and settlement systems related to virtual asset transactions. [read post]
30 Mar 2007, 10:50 am
The proactive result of such an investigation would generally be the identification of system and process weaknesses.The focus is more and more being turned towards implementing a technology-based, proactive detection and prevention methodology that allows for the analysis of 100% of the data in a relatively short period. [read post]
29 Dec 2006, 11:12 am
While there, she worked with litigation teams to design electronic discovery solutions including digital evidence production, searching, analyzing, and using data in case management systems. [read post]
6 Mar 2007, 4:49 pm
This approach dramatically compresses the electronic discovery process making all corporate data accessible, easily searchable, and available for litigation purposes at a small fraction of the cost of manually intensive processes. [read post]
25 Oct 2023, 9:50 am by Sarah M.D. Luth
Cybersecurity measures help protect your business against vulnerabilities created by reliance on electronic data. [read post]
15 Nov 2010, 12:26 pm by Dean Gonsowski
  In 2011, new problems will continue to crop up on the horizon, such as collecting SharePoint data from the cloud, trying to extract structured data from a range of proprietary systems and capturing ephemeral ESI from an ever changing array of social media applications. [read post]
29 Jan 2017, 7:04 pm by Rosemary McKenna
  At least one hacker took advantage of these vulnerabilities, by obtaining information through hundreds of electronic requests for customer data. [read post]
31 Jan 2008, 9:38 am
" EED combines unmatched expertise with the most advanced automated content processing systems to ensure rapid and precise preparation of raw data for review. [read post]