Search for: "Custodian of Records/Computer Files" Results 101 - 120 of 140
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 Aug 2011, 8:00 am by Above the Law
Some customers have saved as much as 60 percent over traditional eDiscovery costs by using Autonomy solutions to rapidly understand and identify key issues, assess case merits, identify unknown patterns or custodians and organize millions of files into prioritized collections for review.Autonomy solutions are available in a range of flexible deployment options including on- premise, cloud-based, or hybrid deployments. [read post]
29 Jul 2011, 10:16 am by Brandon D'Agostino
  Now, if an employee is suspected of wrongdoing and the potential deletion of files will dramatically alter the case, then by all means, hire a forensic investigator and follow all of the protocols established over the last several decades in computer forensic science. [read post]
25 Mar 2011, 4:06 pm by Dean Gonsowski
Employee “deleted and intentionally wiped files from his computer” the day after Philips demanded his laptop be turned over. [read post]
7 Feb 2011, 4:21 pm by Hedge Fund Lawyer
If you are not operating pursuant to a guarantee agreement, submit semi-annual 1-FR-IB filings via EasyFile within 17 business days of the date of the statement (in addition to completing and maintaining monthly net capital computations). [read post]
17 Nov 2010, 12:09 pm by Kurt Leafstrand
Search indexes are susceptible to data corruption just like any other computer file, but the large size of indexes containing billions of records increases the probability of errors. [read post]
10 Nov 2010, 5:28 pm
In her deposition in another case, she testified that she was the records custodian for Litton Loan. [read post]
27 Sep 2010, 6:23 am by Susan Brenner
Evidence of child pornography was uncovered during the search of these computers and computer servers, and an indictment . . . followed. [read post]
11 Aug 2010, 10:48 am
eDiscovery News Context for Applying Discovery 1st Circuit Upholds Maine Law Regulating Data Mining - http://tinyurl.com/26xbn2e A Decoding the ESI of Intent: Bimbo Bakeries and Industrial Espionage - http://tinyurl.com/28nba22 America’s Got e-Discovery Talent: Judging the Hot Cases of 2010 - http://tinyurl.com/2fkso2v Authenticating Cell Phone Records - http://tinyurl.com/2c97bgy BlackBerry Bans: A Question of Business, or Ethics? [read post]
27 May 2010, 2:32 pm by Brandon D'Agostino
  Simply emailing a hold notice to a custodian and recording the hold on a spreadsheet is not enough given Judge Shira Sheindlin’s recent opinion in Pension Committee v. [read post]
13 Apr 2010, 2:08 pm by Mehmet Munur
Loving Care’s Electronic Communication Policy read:[1] The company reserves and will exercise the right to review, audit, intercept, access, and disclose all matters on the company's media systems and services at any time, with or without notice. . . .[2] E-mail and voice mail messages, internet use and communication and computer files are considered part of the company's business and client records. [read post]
8 Apr 2010, 9:36 am by Venkat
It reported that its public records request revealed that someone used Judge Saffold's work computer to access the paper's website at the same exact time as when someone left some of the comments. [read post]
16 Mar 2010, 7:29 am by Jeralyn
§§ 2701-2712) sets forth the appropriate legal process required to compel online services records custodians to disclose customer records and contents. [read post]
5 Mar 2010, 3:56 am
The download allows a custodian to select the files they wish to be collected. [read post]
25 Jan 2010, 5:19 pm by Andis Kaulins
European Union - EU - European Commission - Information Society: "Legal and Administrative Practices Regarding the Validity and Mutual Recognition of e-Documents - 17 December 2006 The study clarifies the present situation concerning the national legal and administrative practices in 32 countries (the 25 Member States, 3 EFTA countries parties to the EEA Agreement (Iceland, Liechtenstein and Norway), 2 Acceding Countries (Bulgaria and Romania) and 2 Candidate Countries (Croatia and Turkey); it… [read post]
12 Nov 2009, 7:03 am by Richard A. Rogan
JMBM Special Assets Team members have looked through countless credit files, legal files, desk files, and e-mails tucked away in electronic folders on a computer somewhere in the bank. [read post]
18 Aug 2009, 7:52 am
The primary authenticity issue in the context of business records is on what has, or may have, happened to the record in the interval between when it was placed in the computer data file and the time of the hearing. [read post]
4 Jul 2009, 11:26 am
SEC registered advisers with more than five clients who are residents of California must make a notice filing with the Department. [read post]