A court may not accept your Discovery data as evidence unless you can prove its integrity. How do you know if it has been tampered with and thus is no longer authentic? How do you deter malicious behavior and remove ambiguity over the authenticity of your records? How do you prove the ‘what’, ‘when’, and ‘who’ of any digital and/or non-digital event?
Contributor
-
- John M. Facciola, Magistrate Judge, The District of Columbia
Download Podcast
Google Podcast, Spotify, Pandora, iHeartRadio, SoundCloud, TuneIn, and Stitcher. Find other syndication channels here or search CIO Talk Network podcast on any other app.
Explore More
- Modernizing Data Management
- Data Management: If the shoe fits, then let’s run
- Enterprise Storage and Compliance: Feeding the Monster!
- Creating a Winning Cyberthreat/Ransomware Management Strategy
- Digital-Enabled Wealth Management
- Steps to Digital-Enabled Contract Lifecycle Management
- Effective Patch Management
- New Orleans Disaster: The IT Management Story
- IT Management in the Wake of a Natural Disaster
- The BPM (Business Process Management) Wave