Archives
Author Archive
for: ‘’

Facial recognition technology brings security & privacy concerns

In recent years, facial recognition technology has had some great successes. They include recognizing the faces involved in terroristic attacks, scanning faces at the airport for identification instead of using a passport, and—now—becoming a feature of our digital devices. It’s clear that new applications of this technology are being utilized to streamline and simplify. Facial […]

Read More

Putting communication and clients first in digital forensic analysis

Within the software development community, production methodologies are adjusting rapidly to account for an increase in active consumer participation and involvement. The status quo is no longer suitable when consumers have specific demands regarding what their software must be able to do for them. Software engineers are no longer able to simply guess what their […]

Read More

Digital evidence: New authentication standards coming

As it is now written, Federal Rule of Evidence 902 pertains to self-authenticating records such as newspapers and public records that require no external evidence to be made admissible at trial. Soon, the rule will encompass digital records generated by electronic processes in addition to records preserved directly from electronic devices or files, such as […]

Read More

Your Personal Data – Or Is It? Doxxing and online information resellers pose threats to the legal community

Given the sensitive nature of the courtroom and of the emotions that may arise there, attorneys, judges, and others in the legal community are at particular risk of becoming victims of doxxing-related crime. Doxxing is a term used to describe the buying, selling, gathering, posting, or distributing of private information online. Importantly, doxxing is typically […]

Read More

What You Don’t Know Can Hurt You: Computer Security for Lawyers

The burgeoning growth of electronic communications has offered lawyers convenience and efficiency previously unimagined. But the benefits have not come without costs, including heightened risks that data may be lost or confidentiality breached.  Knowing these risks and how to meet them is increasingly critical. Over the past ten years, the landscape of consumer technologies has changed […]

Read More

Articles by Issue

Articles by Subject