Job postings are among the richest source of valuable company information. One help-wanted ad for an IP law firm offers a link to “our client list.” For business spies, that's like a neon sign that says, “We have secrets belonging to the following companies!”
Habeas Hard Drive’s own experience bears out the claim that damsels-in-distress have a very tough time making Facebook care about revenge porn. It’s agonizing for the humiliated party, who needs help from the social media site to positively identify the harasser or to remove the offending material, or both. The weeks turn into months with no action from Facebook.
A New York judge has flung the email discovery door wide open, granting unfettered access to a Gmail account. Judge Gabriel W. Gorenstein may as well have ordered both sides to spend more time, more money, and work much harder than they need to.
Cyrus Farivar was surprised by the detail in his 76-page travel dossier, generated by travel industry software and retained by U.S. Customs and Border Control. A privacy outrage, perhaps, but a valuable eDiscovery source.
You’ve been warned, by none other than the U.S. Secret Service, that the computers in hotel business centers are attractive targets for information thieves. Habeas Hard Drive wishes to point out that plenty of schemes exist to slurp up digital assets from business travelers, and to physically steal laptops and mobile devices from hotel environments.
The so-called “internet of things” will produce exponentially more information related to every human life, and more incursions into personal privacy. What is the limit on eDiscovery when your mattress is equipped to send a signal to the coffee pot and the thermostat as soon as it detects that you’ve stirred in the morning?
Cyberattacks against Dropbox are proliferating. Just as litigators have been forced into familiarity with social media as a source of evidence, they will also get to know Dropbox.
As Dropbox and similar file-sharing services are more widely adopted, and as their contents escalate in value – intellectual property and human resources data come to mind – they will be a growing source of leaked information and cyberattacks. Examining security policy, and its enforcement around file-sharing products, will be a key task for litigators, as will discovering which employees have complied and which have not. Click headline to read more.