Filtering Electronic Evidence
Tom Hopkinson and Michele C.S. Lange review the US practice of using filtering technology to navigate electronic evidence, and the lessons we might learn from it….
Tom Hopkinson and Michele C.S. Lange review the US practice of using filtering technology to navigate electronic evidence, and the lessons we might learn from it….
The recent acquittal of Aaron Caffrey of a charge pursuant to s 3 of the Computer Misuse Act 1990 has brought to light the inadequacies of both that Act and other aspects of the criminal justice system in dealing with denial of service attacks. Shelley Hill suggests it is time to review the law….
Read More… from Driving a Trojan Horse and Cart through the Computer Misuse Act
Whether viewed as a spy in your shopping or just a security device, RFID tags have made the headlines. Alexander Brown explains the technology, the general concerns and the law….
Read More… from RFID Tags: An Unlawful, or Just Unwanted, Invasion of Privacy?
James Catchpole LLM reviews Technology Outsourcing: A Practitioners’s Guide, edited by John Angel (Law Society Publishing – £79.95)…
Read More… from Technology Outsourcing A Practitioner’s Guide
In early November 2003, Mark Humphries, Neil Mirchandani and Sanjay Bhandari, members of the Commercial Litigators’ Forum (the CLF), published a working paper dealing with the disclosure of electronic evidence in commercial dispute resolution. The paper can be accessed via the CLF’s Web site, but the main issues addressed in the paper are examined here by Neil Mirchandani….
Trying to react to an incident by gathering all the digital evidence is difficult. Dr. Rob Rowlingson of QinetiQ explains how proper preparation can ease the burden….
Read More… from Forensic Readiness – Enabling a Corporate Approach to Digital Evidence
Clive Carmichael-Jones comments on recent cases involving Trojan horses….
Mike Butler of Hammonds draws attention to the latest consultation paper and draft guidance from the OFT….
A debate is raging in the software industry at the moment between supporters of open source software, who argue for maximum disclosure of software code, and suppliers of proprietary software, who jealously guard access to their source code. As many organisations in both the private and public sectors look to open source software as a reliable and flexible solution to their needs, the proprietary software industry looks increasingly under threat. Caroline Barton of Field Fisher Waterhouse discusses the conflict….
Software bombs have been commonplace in the IT industry for many years. Tim Sewart addresses a question asked of him on a number of occasions: are they legal?…