Privacy and security issues impact every aspect of our lives – home, work, travel, education, health/medical, to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – three significant highlights of this week’s column: 10 Investigative Tools You Probably Haven’t Heard Of; How to Safely Pay for Goods and Services With Someone You Don’t Know; and The Best Browsers of 2018: Chrome, Firefox, Edge, and More Tested.
According to Conrad J. Jacoby e-mail conversion is done without a second thought in many e-discovery projects, and the results are often satisfactory to both producing and requesting parties. However, each major e-mail archive architecture uses a fundamentally different method for storing information about e-mail messages, and sometimes some collateral damage will occur.
In the Wake of Katrina – Where to Find Answers about Courts, Lawyers
Burney’s Gadgets for Legal Pros
The Mirra Personal Server 2.0
By Brett Burney
Introduction to Disaster Plans: Yes It Can Happen to You