Corporate Records: Voice-mail

As electronic discovery matures to meet the ever-changing technology landscape, it is incumbent upon the information security practitioner, forensic investigator, General Counsel, or others responsible for the discovery, acquisition, processing, preservation, and presentation of electronic records to keep swimming or risk drowning. There should be no illusion that voicemail would be considered an electronic record… Read More

Social Networks and Social Engineering

I’ve commented occasionally about social networking site and appropriate content posted therein. I’ll share an article I read on a favorite news site. It is an amazing abuse of authority in my opinion. It also demonstrates the hazards of what could happen when low-tech mentality bludgeons high-tech. Original URL: http://www.theregister.co.uk/2009/06/18/american_burg_and_facebook/ US city demands FaceSpaceGooHoo log-ins… Read More

Juris Doctor 41 of 215

This week I’ve studied criminal larceny and embezzlement, third party beneficiaries in contract law, and products liability in tort. Law school has been very rewarding from a knowledge standpoint. I consider myself a life learner and this is a significant challenge I am certain to conquer. First year exams will be in October 2009, which… Read More

Loose Lips, Sink Ships.

A very common mistake made by employers is to allow an employee investigation to become so informal and disorganized that managers and employees learn about the nature of an investigation. The individual(s) who learn of such facts directly or through the rumor mill often relay embellished or false facts about the employee under investigation.  With… Read More

Juris Doctor 40 of 215

The trouble with vacations and changing schedules that come with the kids being out of school for the summer is the whole apple cart is turned over. I am playing catch-up again with my studies. By my estimates I am five days behind in study time. It isn’t a huge lapse by any stretch and… Read More

Cloud Computing: Part 2

Internet information exchange and commerce has matured to the point that we cannot imagine how we would run our businesses without technology anymore. We have created elaborate systems and constructed solid disaster recovery and business continuity mechanisms to protect our digital assets. Until recently, these Internet facing systems have resided on dedicated computers that we… Read More

Moriah Jayne Peters

Well, my lovely daughter has graduated from high school this week. She has also been accepted to attend a very good university in their medical program. I am very proud of her. Be persistent, work hard, and keep your eyes on that prize Moriah, and you can do it!