Blog: The Overbroad Computer Fraud and Abuse Act: Its Implications and Why Its Scope Should be Narrowed

by Barry Gabay, Associate Staff If you are at work and you are reading this, you may be subject to federal criminal sanctions. The Computer Fraud and Abuse Act, the federal government’s key anti-hacking law, was originally enacted in 1986 to deter hackers from wrongfully obtaining confidential governmental and financial …

Continue reading

Blog: Snapchat – Defeating an Authenticity Objection in Court

by Danielle Bringard, Associate Survey and Symposium Editor                     We’ve all done it.  We’ve all taken the “selfie.”  Facebook, Twitter, Tinder, Instagram, and Snapchat are just a few of these social media applications that allow users to transmit photos and videos to each other from various electronic devices.  However, unlike most …

Continue reading

Getting Serious: Why Companies Must Adopt Information Governance Measures to Prepare for the Upcoming Changes to the Federal Rules of Civil Procedure

DownloadPDF Cite as: Philip J. Favro, Getting Serious: Why Companies Must Adopt Information Governance Measures to Prepare for the Upcoming Changes to the Federal Rules of Civil Procedure, 20 Rich. J.L. & Tech. 5 (2014), http://jolt.richmond.edu/v20i2/article5.pdf. Philip J. Favro* “[W]ithout a corresponding change in discovery culture by courts, counsel and clients …

Continue reading

Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice

DownloadPDF Cite as: Bennett B. Borden & Jason R. Baron, Finding the Signal in the Noise: Information Governance, Analytics, and the Future of Legal Practice, 20 Rich. J.L. & Tech. 7 (2014), http://jolt.richmond.edu/v20i2/article7.pdf.   Bennett B. Borden* and Jason R. Baron**   Introduction [1]        In the watershed year of 2012, the …

Continue reading

Understanding and Contextualizing Precedents in e-Discovery: The Illusion of Stare Decisis and Best Practices to Avoid Reliance on Outdated Guidance

DownloadPDF Cite as: Jonathan M. Redgrave, Keltie Hays Peay, & Mathea K.E. Bulander, Understanding and Contextualizing Precedents in e-Discovery: The Illusion of Stare Decisis and Best Practices to Avoid Reliance on Outdated Guidance, 20 Rich. J.L. & Tech. 8 (2014), http://jolt.richmond.edu/v20i2/article8.pdf.   Jonathan M. Redgrave,* Keltie Hays Peay,** and Mathea K.E. …

Continue reading

Defensible Data Deletion: A Practical Approach to Reducing Cost and Managing Risk Associated with Expanding Enterprise Data

DownloadPDF Cite as: Dennis R. Kiker, Defensible Data Deletion: A Practical Approach to Reducing Cost and Managing Risk Associated with Expanding Enterprise Data, 20 Rich. J.L. & Tech. 6 (2014), http://jolt.richmond.edu/v20i2/article6.pdf.   Dennis R. Kiker*   I.  Introduction [1]        Modern businesses are hosts to steadily increasing volumes of data, creating significant …

Continue reading

The Compliance Case for Information Governance

DownloadPDF Cite as: Peter Sloan, The Compliance Case for Information Governance, 20 Rich. J.L. & Tech. 4 (2014), http://jolt.richmond.edu/v20i2/article4.pdf.   By Peter Sloan*   I.  Introduction [1]        In an increasingly convoluted information environment, organizations strive to manage information‑related risks and exposures, minimize information‑related costs, and maximize information value.  The inadequacy of …

Continue reading