According to Conrad J. Jacoby e-mail conversion is done without a second thought in many e-discovery projects, and the results are often satisfactory to both producing and requesting parties. However, each major e-mail archive architecture uses a fundamentally different method for storing information about e-mail messages, and sometimes some collateral damage will occur.
Features – Who is Reading Your Hard Drive Tonight? Security with High Speed Internet Access and a Few Words about Passwords
Who is Reading your Hard Drive Tonight? Security with High Speed Internet Access and a Few Words about Passwords
by Jim Calloway
Security for Intranets and Extranets
Jerry Lawson’s book, The Complete Internet Handbook for Lawyers, will be published in December by the American Bar Association. Mr. Lawson is a lawyer and designer of the Internet Tools for Attorneys Web site, http://www.netlawtools.com.
Database Password Theft: A Lesson on Monitoring Billing & Preventing Loss By Nanna K. Frye
Nanna K. Frye (J.D. & M.S.L.S.) is currently the Law Librarian for the Court of Appeal, 4th District in San Diego.