Search for: "Custodian of Records/Computer Files" Results 61 - 80 of 139
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Dec 2016, 11:15 am by Alex Braun
You can tell a lot about files on a computer before you even open them. [read post]
29 Dec 2016, 11:15 am by Alex Braun
You can tell a lot about files on a computer before you even open them. [read post]
18 Nov 2016, 9:47 am by Rebecca Tushnet
  For US works, ability to file infringement suit could be added. [read post]
21 Mar 2016, 2:04 pm by Chepenik Trushin LLP
  In Florida, the “Florida Computer Crimes Act” and Florida Statute §934, title “Security of Communications; Surveillance”, establish privacy rights and prohibits certain electronic communication services from knowingly providing contests of certain digital communications and files. [read post]
29 Sep 2015, 7:47 am by John Jascob
Each party relied on case law to establish its claims, all non-smartphone scenarios involving the interplay between corporate records and encrypted information on computers. [read post]
28 Sep 2015, 6:00 am by David Kris
  Currently pending in the U.S. courts is a case[20] in which the U.S. government is relying on the SCA to compel Microsoft to produce email stored in Ireland;[21] Microsoft is resisting on the ground that the SCA cannot compel production of data stored abroad; and the Government of Ireland has filed an amicus brief asserting its sovereignty, but conceding that it is “incumbent upon Ireland to acknowledge” that its own Supreme Court has “held that . . . there may be… [read post]
28 Sep 2015, 3:48 am
The Court again reiterated a corporate custodian may not invoke the Fifth Amendment to avoid producing corporate records. [read post]
13 Apr 2015, 2:12 pm by Stephen Bilkis
Simply put, the record demonstrates non-cooperation, non-communication and antag [read post]
12 Jan 2015, 6:01 am by Rakesh Madhava
Get to Know Your Native Files in Litigation Native files are the actual files from a custodian’s computer, such Microsoft Word or Excel files, or emails taken directly from an email server. [read post]
21 May 2014, 11:12 am by NBlack
By selectively choosing appropriate technology tools and software for your firm’s needs — such as cloud computing products that allow your employees to access firm files and work from any device with an Internet connection — you can increase flexibility and productivity and reduce stress. [read post]
3 Apr 2014, 5:00 am
  We’re talking about records of sales reps who left the defendant well beyond the expiration of all but the most extreme statutes of limitations.There were also some missing electronic files for substitute sales reps (for whom dates of departure are not clear) and non-American employees (Japanese and European) who also left the company “between 2001 and 2011. [read post]
21 Mar 2014, 7:31 am by Jay Yurkiw
The court found that the subpoena imposed a significant burden on the non-party because it required him to surrender his personal hard drives, thus (1) forcing him to be without the use of his personal computer for up to 30 days, and (2) forcing him to give the plaintiff access to his personal files. [read post]
22 Feb 2014, 7:15 pm by Daniel Richardson
  On its first trip up in 2012, the SCOV affirmed the trial court's decision as to the records concerning the files of the public works employees. [read post]
17 Jan 2014, 3:22 pm by Sabrina I. Pacifici
Computer files are not worth anything without the software to open them. [read post]
15 Jan 2014, 10:40 am by Jason Krause
But destroying records, failing to produce evidence, and failing to identify custodians or put litigation hold orders in place are unforgivable actions in eDiscovery. [read post]
3 Jan 2014, 9:23 am by Jason Krause
Let’s be honest – no one can ever truly prepare for the discovery of electronic records in litigation. [read post]
12 Dec 2013, 5:15 am by Joy Waltemath
He was not the custodian of the personnel file and there was no evidence he placed the memo in the file or played a part in making the file available for inspection. [read post]
10 Oct 2013, 10:29 pm by Orin Kerr
It’s pretty standard for computer warrants to authorize the seizure of passwords, encryption codes, operating manuals, “and other information necessary to access the computer equipment, storage devices or data. [read post]
17 Jun 2013, 4:57 am by Susan Brenner
Specifically, the Second Subpoena is addressed to TLO's custodian of records and directs that the CPS source code and documentation be delivered to this Court without delay. [read post]
18 Dec 2012, 12:39 pm by Hopkins
The metadata tells the computer where the data you need is located and how to retrieve and sort it by various bits of information, including the metadata basics: Custodian; Source; Original file path; File name; Last modified date; Last modified time. [read post]